Fountain-coding aided symmetrical encryption for secure wireless transmission

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

It is difficult to ensure secure transmissions in wireless networks because of the openness of radio signal. In this paper, a fountain-coding aided symmetrical encryption scheme is proposed to deal with this problem. In the proposed scheme, all source packets are first encrypted with a secret key. Then, all encrypted source packets are encoded with fountain code and next transmitted on wireless channels. Finally, the secret key is encrypted with all the fountain-coded packets the legitimate receiver has received for sharing the secret key between the legitimate users. Due to the independent fading characteristic between the legitimate channel and the wiretap channel, if the eavesdropper fails to correctly receive some fountain-coded packets the legitimate receiver receives, the wireless transmission can be secured under appropriate conditions. Compared with the counterparts, the proposed scheme achieves lower intercept probability of the eavesdropper with little receiver feedback burden under appropriate conditions.

Original languageEnglish
Title of host publicationCommunications and Networking - 12th International Conference, ChinaCom 2017, Proceedings
EditorsDeze Zeng, Lei Shu, Bo Li
PublisherSpringer Verlag
Pages341-350
Number of pages10
ISBN (Print)9783319781297
DOIs
StatePublished - 2018
Event12th International Conference on Communications and Networking in China, CHINACOM 2017 - Xian, China
Duration: 10 Oct 201712 Oct 2017

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume236
ISSN (Print)1867-8211

Conference

Conference12th International Conference on Communications and Networking in China, CHINACOM 2017
Country/TerritoryChina
CityXian
Period10/10/1712/10/17

Keywords

  • Eavesdropper
  • Fountain code
  • Intercept probability
  • Receiver feedback burden
  • Secret key
  • Secure wireless transmission

Fingerprint

Dive into the research topics of 'Fountain-coding aided symmetrical encryption for secure wireless transmission'. Together they form a unique fingerprint.

Cite this