SlideShare a Scribd company logo
1 of 12
Download to read offline
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
DOI: 10.5121/ijwmn.2018.10301 1
EFFICIENTLY SECURE BROADCASTING IN 5G
WIRELESS FOG-BASED-FRONTHAUL NETWORKS
Nabeel I. Sulieman and Richard D. Gitlin
Department of Electrical Engineering, University of South Florida
Tampa, Florida 33620, USA
ABSTRACT
Enhanced Diversity and Network Coding (eDC-NC), the synergistic combination of Diversity and modified
Triangular Network Coding, was introduced recently to provide efficient and ultra-reliable networking with
near-instantaneous fault recovery. In this paper it is shown that eDC-NC technology can efficiently and
securely broadcast messages in 5G wireless fog-computing-based Radio Access Networks (F-RAN). In
particular, this work is directed towards demonstrating the ability of eDC-NC technology to more
efficiently provide secure messages broadcasting than standardized methods such as Secure Multicasting
using Secret (Shared) Key Cryptography, such that the adversary has no ability to acquire information
even if they wiretap the entire F-RAN network (except of course the source and destination nodes). Our
results show that using secure eDC-NC technology in F-RAN fronthaul network will enhance secure
broadcasting and provide ultra-reliability networking, near-instantaneous fault recovery, and retain the
throughput benefits of Network Coding.
KEYWORDS
5G, Diversity Coding, Triangular Network Coding, F-RAN, Secure Multicasting
1. INTRODUCTION
Many wired and wireless networks securely broadcast/multicast messages to a group of receivers.
Several studies [1]-[4] have theoretically analyzed the ability of Network Coding [5] to provide
secure broadcasting/multicasting in any wired or wireless network. These papers assume that the
number of channels that the eavesdropper can wiretap is equal to or less than the number of
tolerated wiretapped channels in the network, which is a design parameter [1]-[4]. However, this
assumption is not valid in real networks, as the eavesdropper might have the ability to wiretap the
entire network of channels. To overcome this vulnerability, Secret (Shared) Key Cryptography and
Network Coding is utilized to provide efficient, secure messages broadcasting. In this study it is
shown that Enhanced Diversity and Network Coding (eDC-NC) [6]-[7], which is the synergistic
combination of Diversity Coding [8] and modified Triangular Network Coding [9], can efficiently
and securely broadcast messages in 5G wireless fog-computing-based Radio Access Networks
(F-RANs). F-RANs are an alternative network architecture to Cloud Radio Access Networks
(C-RANs) [10]-[12] that are under consideration for 5G networks, where the centralized processing
in the baseband unit (BBU) of the C-RAN are replaced by edge nodes with the ability to control,
process and store data, and communicate with each other [10]-[12].
It is shown in [6]-[7] that eDC-NC can simultaneously improve the network reliability, reduce
computational complexity, enable extremely fast recovery from simultaneous multiple link/node
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
2
failures, and retain the throughput improvement of Network Coding for broadcasting/multicasting
applications of a F-RAN wireless fronthaul networks.
The contribution of this paper is demonstrating the ability of eDC-NC technology to more
efficiently provide secure messages broadcasting than standardized methods such as Secure
Multicasting [13], such that the adversary cannot acquire any information even if they can wiretap
the entire F-RAN network (except of course the source and destination nodes). In this way,
eDC-NC will enhance secure broadcasting and provide ultra-reliability networking, near-
instantaneous fault recovery, and retain the throughput gain of Network Coding.
The structure of this paper is as follows. The system model based on F-RAN wireless fronthaul
network is described in Section 2. Section 3 demonstrates the ability of eDC-NC coding to provide
secure broadcasting/multicasting followed by the application of secure eDC-NC to F-RAN wireless
fronthaul networks in Section 4 and its efficiency analysis in Section 5. The paper ends with the
concluding remarks in Section 6.
2. SYSTEM MODEL
F-RANs were proposed in [10]-[12] to enhance the performance of C-RANs by migrating a
significant number of functions to edge devices and substantially upgrading the Remote Radio
Heads (RRHs). These functions include controlling, communicating, measuring, managing, and
storing and processing of data. The upgraded RRH is called a Fog Access Point (F-AP), and is
able to communicate with other F-APs. One of the benefits of this architecture is decreasing
latency by performing functionality at the network edge rather than in the core [10]-[12]. There
are three layers in the architecture of F-RANs as illustrated in Figure 1 [10]. The network layer
contains the BBU pool, centralized storage, and communication and computing cloud. The F-APs
represents the access layer. The terminal layer contains Fog-user equipment (F-UE) that access
the F-AP [10]-[11]. Adjacent F-APs can be formed into two topologies: a mesh topology or a
tree-like topology. Both of these topologies can significantly minimize the degrading effects of
capacity-constrained fronthaul links [10].
Figure 1. F-RAN network architecture.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
3
Although there are different transmission modes in a F-RAN, this paper is focused on the Local
Distributed Coordination (LDC) mode, as it is the core mode of the F-RAN as shown in Figure 1
[10]. In the LDC, the F-APs communicate with other F-APs to serve the F-UEs. This will
decrease the burden on the fronthaul network and quickly suppress interference or transmit the
required data to the UE not from the cloud server but from the F-APs [10].
In [7], eDC-NC coding is applied to a wireless sensor network to provide ultra-reliable with
near-instant fault recovery and efficient energy consuming system, and here the ability of eDC-NC
to provide efficient secure messages broadcasting and apply secure eDC-NC coding to the LDC
fronthaul network is demonstrated, where F-APs are connected to each other in a mesh topology
as shown in Figure 2. In this paper, the connections are considered to be wireless links and
wiretapped by an eavesdropper. To minimize interference and be able to communicate with each
other, such F-APs will likely utilize MIMO technology [14].
Figure 2. Example F-RAN fronthaul network with wireless links.
3. SECURE ENHANCED DC-NC BROADCASTING NETWORK
In order to illustrate how Secret (Shared) Key Cryptography is used in eDC-NC type networks and
to provides secure broadcasting, consider the point-to-multipoint network topology depicted in
Figure 3.
Each broadcasting session will have its own secret (shared) session key. The source node (node 1)
and the receiver nodes (nodes 5 and 6) will share the broadcasting session key. Controlling the
distribution of the keys between the source and the legitimate receivers is a primary issue in any
communication network. The IETF Group Domain of Interpretation (GDOI) protocol defined in
Request for Comments (RFC-6407) [15] may be used to facilitate connecting the source and the
destinations to a key server, where using Public Key Cryptography (PKC) the keys are encrypted
and distributed to the members of secure multicast group. The source and the destinations can be
authenticated and authorized to form a specific multicast group by the key server such that the
shared key is utilized to encrypt and decrypt messages between members of the group [15]. In
this way, the broadcasting session (shared) key will be distributed securely to the source and
destination nodes.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
4
Figure 3. Example wireless network with secure broadcasting via eDC-NC coding that
broadcasts two data streams to nodes 5 and 6 and protects each stream from one link/relay node
failure. The solid lines represent the wireless links that carry coded data streams and are used to
improve network throughput whereas dashed lines represent the wireless links that carry coded
data streams and are used to maximize network reliability.
In our example network the source broadcasts two data streams π‘₯1 and π‘₯2 to destination nodes 5
and 6 using relay nodes 2, 3, 4, and 7.
The system proceeds as follows:
(1) The streams 𝑐1 and 𝑐2 are created using eDC-NC encoding [6], which will be referred to as
eDC-NC coded data streams to distinguish them from the encrypted data streams as follows:
𝑐1 = π‘₯1,0 βŠ• π‘₯2,1 (1)
𝑐2 = π‘₯1,0 βŠ• π‘₯2,2 (2)
where π‘₯𝑖,π‘Ÿπ‘–
represents the raw data stream 𝑖 and π‘Ÿπ‘– is the number of redundant β€œ0” bit(s) that are
added at the head of raw data stream 𝑖, 𝑐𝑖 represents the eDC-NC coded data stream 𝑖. Note that
the eDC-NC coded data stream, 𝑐2, will be encrypted using the shared key at the source node 1 then
it will be transmitted. Therefore, it appears in the figure as 𝑐2
𝑒𝑛𝑐
.
(2) The source node (node 1) encrypts the streams π‘₯1, π‘₯2, and 𝑐2 using the Secret (Shared) Key
Cryptography algorithm.
Node 1 transmits π‘₯1
𝑒𝑛𝑐
and π‘₯2
𝑒𝑛𝑐
to nodes 5 and 6 respectively via relay nodes 2 and 3 respectively.
In addition, node 1 transmits 𝑐1 in order to realize the throughput gain provided by eDC-NC
networking [6]-[7] and 𝑐2
𝑒𝑛𝑐
to be able to tolerate one link/relay node failure [6]-[7] to the
destination nodes 5 and 6 via relay nodes 4 and 7 respectively.
(3) At the destination side, for example, node 5 will use the broadcasting session shared key to
decrypt the received data streams using the Secret (Shared) Key Cryptography algorithm depending
on the following situations:
a. If all data streams are correctly received (by checking the CRC), 𝑐2
𝑒𝑛𝑐
is ignored and π‘₯1
𝑒𝑛𝑐
will
be decrypted to find π‘₯1. Next, π‘₯2 will be recovered by applying π‘₯1 to 𝑐1 using the eDC-NC decoding
algorithm that was explained in detail in [6].
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
5
b. If one data stream is either incorrectly received or not received at all (either 𝑐2
𝑒𝑛𝑐
or π‘₯1
𝑒𝑛𝑐
), the
receiver will decrypt the one that is correct (correct CRC) and then apply it to 𝑐1 to obtain π‘₯2
similarly to step a.
c. If 𝑐1 fails, the receiver will decrypt both 𝑐2
𝑒𝑛𝑐
and π‘₯1
𝑒𝑛𝑐
to get 𝑐2 and π‘₯1 then similarly to step a
apply π‘₯1 to 𝑐2 to obtain π‘₯2.
It is worth noting that the intermediate (relay) nodes will not need to decrypt the encrypted raw
and eDC-NC coded data streams because they only need to forward them to the destination nodes.
Hence, they do not have to be secured. Also, they CANNOT decrypt the encrypted raw and
eDC-NC coded data streams because they do not have the broadcasting session secret (shared) key.
Now, suppose that the adversary wiretaps the entire network, he/she will have π‘₯1
𝑒𝑛𝑐
, π‘₯2
𝑒𝑛𝑐
, 𝑐1, and
𝑐2
𝑒𝑛𝑐
. Only 𝑐1 is not encrypted but it will not disclose any information because it is a XOR
combination of raw data streams π‘₯1 and π‘₯2. The other data streams are encrypted so, the adversary
will need to know the broadcasting session secret (shared) key to decrypt them.
In this way, as long as the adversary does not possess the broadcasting session key, it will not be
able to get any information even if he/she wiretaps the entire network (except of course the source
and destination nodes).
4. APPLYING SECURE ENHANCED DC-NC CODING TO F-RANS
Enhancing the security (privacy) of transmitted information in 5G wireless F-RAN fronthaul
networks is critical due to the vulnerability of wireless links. In addition, although F-APs have
specific resources, but these should be used efficiently. Enhanced DC-NC technology was
recently utilized to improve the efficiency and reliability of 5G wireless F-RAN fronthaul
networks and provide rapid recovery time from multiple simultaneous link/node failures while
retaining the throughput enhancement feature of Network Coding for broadcasting applications [6].
Here, secure eDC-NC technology is applied to Local Distributed Coordination (LDC) transmission
mode in an F-RAN network to achieve the above benefits and to efficiently improve its security,
as depicted in Figure 4.
In this example, F-APs are connected to each other in a mesh topology by bi-directional wireless
links. Here, a point-to-multipoint network topology models the application of securely broadcasting
three data streams π‘₯1, π‘₯2, and π‘₯3 from one F-AP (F-AP1) to three F-APs (F-APs 6, 7, and 8) using
intermediate relay nodes F-APs 2, 3, 4, 5, and 9. As mentioned in Section 3, each broadcasting
session will have its own secret (shared) session key. The source node (F-AP1) and the receiver
nodes (F-APs 6, 7, and 8) will share the broadcasting session key using the GDOI protocol.
The system proceeds as follows:
(1) The coded data streams 𝑐1, 𝑐2, and 𝑐3 are created using eDC-NC encoding [6] as follows:
𝑐1 = π‘₯1,0 βŠ• π‘₯2,1 βŠ• π‘₯3,2 (3)
𝑐2 = π‘₯1,0 βŠ• π‘₯2,2 βŠ• π‘₯3,1 (4)
𝑐3 = π‘₯1,0 βŠ• π‘₯2,3 βŠ• π‘₯3,5 (5)
Note that the eDC-NC coded data stream (𝑐3) will be encrypted using the shared key at F-AP1 then
it will be transmitted. Therefore, it appears in the figure as 𝑐3
𝑒𝑛𝑐
.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
6
Figure 4. Example wireless fronthaul Fog-RAN network with secure eDC-NC coding that
broadcasts three data streams to F-AP6, F-AP7, and F-AP8 and protects each stream from one
link failure. The solid lines represent the links that carry coded data streams and are used to
improve network throughput whereas dashed lines represent the links that carry coded data
streams and are used to maximize network reliability.
(2) F-AP1 encrypts the streams π‘₯1, π‘₯3, and 𝑐3 using the Secret (Shared) Key Cryptography
algorithm. Note that data stream π‘₯2 does not need to be encrypted because there is no need to
transmit it in a separate link. However, it can be recovered from the coded data streams at the
destination F-APs.
F-AP1 transmits π‘₯1
𝑒𝑛𝑐
and π‘₯3
𝑒𝑛𝑐
to F-AP6 and F-AP8 respectively via relays F-APs 2 and 3
respectively. In addition, 𝑐1 and 𝑐2 are transmitted to realize the throughput gain provided by
eDC-NC [6]-[7] and 𝑐3
𝑒𝑛𝑐
to be able to tolerate one link/relay F-AP failure via eDC-NC [6]-[7] to
the destination F-APs 6, 7, and 8 via relays F-APs 4, 5, and 9 respectively.
(3) At the destination side, for example, F-AP6 will use the broadcasting session shared key to
decrypt the arrived data streams via Secret (Shared) Key Cryptography algorithm based on the
following situations:
a. If all data streams are correctly received (by checking the CRC), 𝑐3
𝑒𝑛𝑐
is ignored and π‘₯1
𝑒𝑛𝑐
will
be decrypted to find π‘₯1. Next, π‘₯2 and π‘₯3 will be recovered using the eDC-NC decoding algorithm
that was explained in detail in [6].
b. If one data stream is either incorrectly received or not received at all (either 𝑐3
𝑒𝑛𝑐
or π‘₯1
𝑒𝑛𝑐
), the
receiver will decrypt the one that is correct (by checking the CRC) and then obtain all data streams
in similar way of step a.
c. If 𝑐1 or 𝑐2 fails, the receiver will decrypt both 𝑐3
𝑒𝑛𝑐
and π‘₯1
𝑒𝑛𝑐
to recover 𝑐3 and π‘₯1 then similarly
as in step a obtain π‘₯2 and π‘₯3.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
7
As it is mentioned in Section 3, the intermediate (relay) F-APs will not need to decrypt the
encrypted raw and eDC-NC coded data streams because they only need to forward the streams to
the destination F-APs. Also, they CANNOT decrypt the encrypted raw and eDC-NC coded data
streams because they do not have the broadcasting session secret (shared) key.
Now, assuming that the eavesdropper wiretaps the entire network, he/she will have π‘₯1
𝑒𝑛𝑐
, π‘₯3
𝑒𝑛𝑐
, 𝑐1,
𝑐2 and 𝑐3
𝑒𝑛𝑐
. Although 𝑐1 and 𝑐2 are not encrypted, no information can be disclosed because they
are XOR combinations of raw data streams π‘₯1, π‘₯2, and π‘₯3. Other data streams are encrypted so, the
eavesdropper will need to know the broadcasting session secret (shared) key to decrypt them.
In this way, as long as the adversary does not have the broadcasting session key, it will not be able
to get any information even if he/she wiretaps the entire network (except, of course, the source and
destination nodes).
Consequently, secure eDC-NC will efficiently enable secure broadcasting and provide ultra-
reliability networking, near-instantaneous fault recovery, and re the throughput gain of Network
Coding of 5G wireless F-RAN fronthaul networks.
5. EFFICIENCY ANALYSIS
Normally, when standard Secure Multicast [13] is utilized to provide network security, the source
has to encrypt all transmitted data streams. However, by applying eDC-NC, the source node does
not need to encrypt all the streams as shown in Section 3 and 4. In the example network in
Section 3, only three out of four data streams have to be encrypted, namely π‘₯1, π‘₯2, and 𝑐2. The
reason for encrypting only three data streams is that the eDC-NC coded data streams 𝑐1 and 𝑐2 are
not plaintext but the mod 2 combination of the raw data streams π‘₯1 and π‘₯2. So, encrypting one
stream (𝑐2
𝑒𝑛𝑐
) in this example network will make recovering the raw data streams impossible
without knowledge of the broadcasting session key to decrypt 𝑐2
𝑒𝑛𝑐
and thus be able to recover both
raw data streams via the eDC-NC decoding algorithm [6]. In this way, the cost/complexity of
encryption will be decreased by 25%. At the receiver, each destination node has only to decrypt
two out of three data streams as a maximum as illustrated in case c in Section 3 above. Hence, the
cost of decryption will be maximum and for two broadcast data streams, there will be no cost
benefits in decryption, (however, for three broadcast data stream, the decryption cost will be
decreased by 33.33%) which is referred to as a minimum decryption cost benefits (Min. DecCB).
However, in some cases, the destination node has only to decrypt one data stream (cases a and b in
Section 3) which decreases the decryption cost by 50%. In this case, the cost of decryption will be
a minimum and there will be 50% decryption cost benefit, which is referred to as a maximum
decryption cost benefits (Max. DecCB). Note that the encryption cost benefit will not vary once the
system parameters are fixed because the source node always needs to encrypt only two raw data
streams and once the number of eDC-NC encoded data stream(s) that will be used to improve the
system reliability has been selected (that is, the number of link failures that can be tolerated) the
benefit will be determined.
In general, for point-to-multipoint network topology, in order to quantify the security cost benefits,
we need to define the following variables:
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
8
π·π‘‘π‘œπ‘‘π‘Žπ‘™: Number of overall transmitted data streams.
𝐷𝑒𝑛𝑐: Number of encrypted (raw and eDC-NC coded) data streams.
π·π‘Ÿπ‘Žπ‘€: Number of broadcast raw data streams.
𝐿 𝑓: Number of link failures that can be tolerated in the network.
𝐷 𝑑𝑒𝑐: Number of decrypted data streams.
Therefore, the security cost benefit can be calculated as follows:
The encryption cost benefits (EncCB) in percentage is:
𝐸𝑛𝑐𝐢𝐡 % =
π·π‘‘π‘œπ‘‘π‘Žπ‘™ βˆ’ 𝐷𝑒𝑛𝑐
π·π‘‘π‘œπ‘‘π‘Žπ‘™
Γ— 100 (6)
where
π·π‘‘π‘œπ‘‘π‘Žπ‘™ = π·π‘Ÿπ‘Žπ‘€ + 𝐿 𝑓 + 1 (7)
and
𝐷𝑒𝑛𝑐 = 𝐿 𝑓 + 2 (8)
Hence,
𝐸𝑛𝑐𝐢𝐡 % =
π·π‘Ÿπ‘Žπ‘€ βˆ’ 1
π·π‘Ÿπ‘Žπ‘€ + 𝐿 𝑓 + 1
Γ— 100 (9)
The decryption cost benefits (DecCB) in percentage at each destination node is:
𝐷𝑒𝑐𝐢𝐡 % =
π·π‘Ÿπ‘Žπ‘€ βˆ’ 𝐷 𝑑𝑒𝑐
π·π‘Ÿπ‘Žπ‘€
Γ— 100 (10)
where
𝐷 𝑑𝑒𝑐 = {
1 𝑖𝑓 π‘‘π‘’π‘ π‘‘π‘–π‘›π‘Žπ‘‘π‘–π‘œπ‘› π‘›π‘œπ‘‘π‘’ β„Žπ‘Žπ‘  π‘›π‘œ π‘™π‘–π‘›π‘˜ π‘“π‘Žπ‘–π‘™π‘’π‘Ÿπ‘’ 𝑂𝑅 π‘œπ‘›π‘™π‘¦ π‘œπ‘›π‘’ π‘’π‘›π‘π‘Ÿπ‘¦π‘π‘‘π‘’π‘‘ π‘‘π‘Žπ‘‘π‘Ž π‘ π‘‘π‘Ÿπ‘’π‘Žπ‘š 𝑖𝑠 π‘™π‘œπ‘ π‘‘
𝐿 𝑓 + 1 π‘œπ‘‘β„Žπ‘’π‘Ÿπ‘€π‘–π‘ π‘’
,
Table 1 shows the security cost benefits in percentage for tolerance of one link failure and
different numbers of broadcast data streams.
Table 1. The security cost benefits in percentage for one link failure tolerance.
Number of
broadcast
data streams
Number of
overall data
streams
Number of
encrypted
data streams
EncCB (%)
Min.
DecCB (%)
Max.
DecCB (%)
2 4 3 25 0 50
3 5 3 40 33.33 66.67
4 6 3 50 50 75
5 7 3 57.14 60 80
6 8 3 62.5 66.67 83.3
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
9
Figures 5 and 6 illustrate the relationship between the encryption and decryption cost benefits
percentage respectively and the number of broadcast data streams. Note that by applying Secure
Multicast [13], all data streams have to be encrypted at the source and decrypted at the destination
nodes. However, Figure 5 and Figure 6 show that by applying Secret (Shared) Key Cryptography
to the eDC-NC broadcast networks, there are always security cost benefits (except in the case of
minimum decryption cost for broadcasting two data streams). Also, they depict the scalability of
eDC-NC by decreasing of the security costs with the increasing the number of broadcast data
streams.
Figure 5. eDC-NC encryption cost benefits.
Figure 6. eDC-NC decryption cost benefits.
However, the security costs will increase with increasing the number of link failures that need to
be tolerated as shown in Figure 7 and Figure 8.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
10
Figure 7. eDC-NC encryption cost benefits for different number of tolerant links.
Figure 8. eDC-NC minimum decryption cost benefits for different number of tolerant links.
6. CONCLUSIONS
This study presented efficient secure broadcasting via eDC-NC technology for 5G wireless F-RAN
fronthaul networks such that the adversary has no ability to acquire any information even if they
wiretap the entire fronthaul network (except of course the source and destination F-APs). The
security of the broadcasting data streams is obtained with lower security cost compared to that of
the standard Secure Multicast protocols. Enhanced secure broadcasting using eDC-NC in F-RAN
wireless fronthaul networks provides ultra-reliable communications, near-instantaneous link/node
failure recovery, and retains the throughput gains of Network Coding.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
11
ACKNOWLEDGEMENTS
Nabeel I. Sulieman is supported by the Higher Committee for Education Development in Iraq
(HCED-IRAQ).
REFERENCES
[1] N. Cai and W. Yeung, β€œSecure Network Coding”, IEEE International Symposium on Information
Theory (ISIT), Lausanne, Switzerland, July 2002, pp. 323.
[2] L. Czap, C. Fragouli, V. M. Prabhakaran, and S. Diggavi, β€œSecure Network Coding with Erasures and
Feedback”, 51st
Annual Allerton Conference on Communication, Control, and Computing (Allerton),
Monticello, IL, USA, Oct. 2013, pp. 1517-1524.
[3] C. Fargouli and E. Soljanin, β€œ(Secure) Linear network coding multicast,” Springer International Journal
of Designs, Codes, and Cryptography, vol. 78, issue. 1, pp. 269-310, Jan. 2016.
[4] S. Rouayheb, E. Soljanin, and A. Sprintson, β€œSecure Network Coding for Wiretap Networks of Type
II,” IEEE Transactions on Information Theory, vol. 58(3), pp. 1361-1371, March 2012.
[5] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, β€œNetwork information flow,” IEEE Transactions
on Information Theory, vol. 46, no. 4, July 2000.
[6] N. I. Sulieman, E. Balevi, and R. D. Gitlin, β€œNear-instant link failure recovery in 5G wireless Fog-base-
fronthaul networks,” IEEE Wireless Telecommunication Symposium, Phoenix, AZ, April 2018.
[7] N. I. Sulieman and R. D. Gitlin, β€œUltra-reliable and energy efficient wireless sensor networks,” IEEE
Wireless and Microwave Technology Conference, Sand Key, FL, April 2018.
[8] E. Ayanoglu, C.-L. I, R. D. Gitlin, and J. E. Mazo, β€œDiversity Coding for transparent self-healing and
fault-tolerant communication networks,” IEEE Trans. Commun., vol. 41, pp. 1677–1686, Nov. 1993.
[9] J. Qureshi, C. H. Foh, and J. Cai, "Optimal solution for the Index Coding problem using Network
Coding over GF(2)," 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad
Hoc Communications and Networks (SECON), Seoul, South Korea, June 2012, pp. 209–217.
[10] M. Peng, S. Yan, K. Zhang, and C. Wang, β€œFog-computing-based radio access networks: issues and
challenges,” IEEE Netw., vol. 30, no. 4, pp. 46-53, Jul./Aug. 2016.
[11] M. Peng and K. Zhang, β€œRecent advances in fog radio access networks: performance analysis and radio
resource allocation,” IEEE Access, vol. 4, pp. 5003-5009, Aug. 2016.
[12] T. Chiu, W. Chung, A. Pang, Y. Yu, and P. Yen, β€œUltra-low latency services provision in 5G fog-radio
access networks,” IEEE International Symposium on Personal, Indoor and Mobile Radio
Communications, Valencia, Spain, Sep. 2016.
[13] Cisco System, β€œCisco IOS Secure Multicast,” whitepaper, 2006. [Online]. Available:
https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ip-
multicast/prod_white_paper0900aecd8047191e.html
[14] Ezio Biglieri, Robert Calderbank, Anthony Constantinides, Andrea Goldsmith, Arogyaswami Paulraj,
and H. Vincent Poor, MIMO wireless communications. Cambridge University Press, 2007.
[15] B. Weis, S. Rowles, and T. Hardjono, β€œThe Group Domain of Interpretation,” RFC 6407, IETF, October
2011.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018
12
AUTHORS
Nabeel I. Sulieman received his B.S. degree in Electrical Engineering from University
of Baghdad, Baghdad – Iraq in 1998, he was one of the ten highest ranked students in
the Electrical Engineering Department, and he received his M.S. degree with merit in
wireless communications systems from Brunel University, London – UK in 2008.
From 2002 until 2014, he worked for Iraqi Telecommunication and Post Company as
a technical support engineer. In addition, he worked as an instructor for short technical
courses in Higher Institute of Telecommunications-Baghdad-Iraq. Currently, he is a
Ph.D. Candidate in Electrical Engineering Department at the University of South
Florida in the Innovations in Wireless Information Networking Laboratory
(iWINLAB) under the supervision of Dr. Richard Gitlin, and his research interests include Diversity Coding,
Network Coding, 5G Wireless Fronthaul Networks, Synchronization of Diversity and Network Coding,
Software Defined Networking (SDN), and Network Function Virtualization (NFV).
Richard D. Gitlin is a State of Florida 21st Century World Class Scholar,
Distinguished University Professor and the Agere Systems Chaired Distinguished
Professor of Electrical Engineering at the University of South Florida. He has more
than 45 years of leadership in the communications and networking industry. He was
at Bell Labs/Lucent Technologies for 32-years performing and leading pioneering
research and development in digital communications, broadband networking, and
wireless systems. Dr. Gitlin was Senior VP for Communications and Networking
Research at Bell Labs and later CTO of Lucent's Data Networking Business Unit.
After retiring from Lucent, he was visiting professor of Electrical Engineering at
Columbia University, where he supervised several doctoral students and research projects and then Chief
Technology Officer of Hammerhead Systems, a venture funded networking company in Silicon Valley.
Since joining USF in 2008, he has focused on the intersection of communications with medicine and created
an interdisciplinary team that is focused on wireless networking of in vivo miniature wirelessly controlled
devices to advance minimally invasive surgery and other cyber-physical health care systems. Dr. Gitlin has
also directed research on advancing wireless local and 4G and 5G cellular systems by increasing their
reliability and capacity. Dr. Gitlin is a member of the National Academy of Engineering (NAE), a Fellow of
the IEEE, a Bell Laboratories Fellow, a Charter Fellow of the National Academy of Inventors (NAI), and a
member of the Florida Inventors Hall of Fame. He is also a co-recipient of the 2005 Thomas Alva Edison
Patent Award and the S.O. Rice prize, has co-authored a text, published ~150 papers and holds 65 patents.

More Related Content

What's hot

A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Β 
477818. paper(92-97)ctts Ψ²ΫŒΩ„Ψ§ΫŒΫŒ
477818. paper(92-97)ctts Ψ²ΫŒΩ„Ψ§ΫŒΫŒ477818. paper(92-97)ctts Ψ²ΫŒΩ„Ψ§ΫŒΫŒ
477818. paper(92-97)ctts Ψ²ΫŒΩ„Ψ§ΫŒΫŒmorteza zilaie bouri
Β 
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
Β 
A XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud InfrastructureA XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
Β 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Β 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network codingNguyen Tan
Β 
Paper id 252014136
Paper id 252014136Paper id 252014136
Paper id 252014136IJRAT
Β 
Ccna day1
Ccna day1Ccna day1
Ccna day1kkhan745
Β 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
Β 
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Β 
An enhancement of rtscts control handshake in
An enhancement of rtscts control handshake inAn enhancement of rtscts control handshake in
An enhancement of rtscts control handshake ineSAT Publishing House
Β 
An enhancement of rts
An enhancement of rtsAn enhancement of rts
An enhancement of rtseSAT Journals
Β 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...Alexander Decker
Β 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
Β 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...csandit
Β 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSIJNSA Journal
Β 
14 12 may17 18nov16 13396 m f hashmi
14 12 may17 18nov16 13396 m f hashmi14 12 may17 18nov16 13396 m f hashmi
14 12 may17 18nov16 13396 m f hashmiIAESIJEECS
Β 

What's hot (18)

A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks
Β 
477818. paper(92-97)ctts Ψ²ΫŒΩ„Ψ§ΫŒΫŒ
477818. paper(92-97)ctts Ψ²ΫŒΩ„Ψ§ΫŒΫŒ477818. paper(92-97)ctts Ψ²ΫŒΩ„Ψ§ΫŒΫŒ
477818. paper(92-97)ctts Ψ²ΫŒΩ„Ψ§ΫŒΫŒ
Β 
Recital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless networkRecital Study of Various Congestion Control Protocols in wireless network
Recital Study of Various Congestion Control Protocols in wireless network
Β 
A XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud InfrastructureA XMLRPC Approach to the Management of Cloud Infrastructure
A XMLRPC Approach to the Management of Cloud Infrastructure
Β 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
Β 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network coding
Β 
Paper id 252014136
Paper id 252014136Paper id 252014136
Paper id 252014136
Β 
Ccna day1
Ccna day1Ccna day1
Ccna day1
Β 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Β 
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
Β 
An enhancement of rtscts control handshake in
An enhancement of rtscts control handshake inAn enhancement of rtscts control handshake in
An enhancement of rtscts control handshake in
Β 
An enhancement of rts
An enhancement of rtsAn enhancement of rts
An enhancement of rts
Β 
A2546035115
A2546035115A2546035115
A2546035115
Β 
11.a review of improvement in tcp congestion control using route failure det...
11.a  review of improvement in tcp congestion control using route failure det...11.a  review of improvement in tcp congestion control using route failure det...
11.a review of improvement in tcp congestion control using route failure det...
Β 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Β 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
Β 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
Β 
14 12 may17 18nov16 13396 m f hashmi
14 12 may17 18nov16 13396 m f hashmi14 12 may17 18nov16 13396 m f hashmi
14 12 may17 18nov16 13396 m f hashmi
Β 

Similar to EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS

SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
Β 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
Β 
On the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networksOn the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networksjournalBEEI
Β 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1darulquthni
Β 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct
Β 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct_journal
Β 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...IRJET Journal
Β 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.comIJERD Editor
Β 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networkingSisir Ghosh
Β 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...ijassn
Β 
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...ijassn
Β 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionijasuc
Β 
Wireless adhoc multi access networks
Wireless adhoc multi access networksWireless adhoc multi access networks
Wireless adhoc multi access networksIJCNCJournal
Β 
Air Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM ConfigurationsAir Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM ConfigurationsMalik Saad
Β 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...BRNSSPublicationHubI
Β 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
Β 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
Β 
Frame Relay
Frame RelayFrame Relay
Frame RelayNetwax Lab
Β 

Similar to EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS (20)

SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
Β 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
Β 
On the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networksOn the latency and jitter evaluation of software defined networks
On the latency and jitter evaluation of software defined networks
Β 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
Β 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
Β 
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESCODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICES
Β 
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Data Rates Performance Analysis of Point to Multi-Point Wireless Link in Univ...
Β 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
Β 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
Β 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
Β 
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
Β 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
Β 
Wireless adhoc multi access networks
Wireless adhoc multi access networksWireless adhoc multi access networks
Wireless adhoc multi access networks
Β 
Ax24329333
Ax24329333Ax24329333
Ax24329333
Β 
Air Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM ConfigurationsAir Interface Virtualization using FBMC and OFDM Configurations
Air Interface Virtualization using FBMC and OFDM Configurations
Β 
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Performance Analysis of MAC Layer Protocols for WSN with Considering the Effe...
Β 
50120140503006
5012014050300650120140503006
50120140503006
Β 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Β 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
Β 
Frame Relay
Frame RelayFrame Relay
Frame Relay
Β 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
Β 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
Β 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
Β 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
Β 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
Β 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
Β 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
Β 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
Β 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
Β 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
Β 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
Β 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
Β 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
Β 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
Β 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
Β 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Β 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Β 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Β 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Β 
young call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Service
young call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Serviceyoung call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Service
young call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Service
Β 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
Β 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
Β 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Β 
young call girls in Green ParkπŸ” 9953056974 πŸ” escort Service
young call girls in Green ParkπŸ” 9953056974 πŸ” escort Serviceyoung call girls in Green ParkπŸ” 9953056974 πŸ” escort Service
young call girls in Green ParkπŸ” 9953056974 πŸ” escort Service
Β 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Β 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Β 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Β 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Β 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Β 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Β 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
Β 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Β 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Β 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
Β 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
Β 

EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS

  • 1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018 DOI: 10.5121/ijwmn.2018.10301 1 EFFICIENTLY SECURE BROADCASTING IN 5G WIRELESS FOG-BASED-FRONTHAUL NETWORKS Nabeel I. Sulieman and Richard D. Gitlin Department of Electrical Engineering, University of South Florida Tampa, Florida 33620, USA ABSTRACT Enhanced Diversity and Network Coding (eDC-NC), the synergistic combination of Diversity and modified Triangular Network Coding, was introduced recently to provide efficient and ultra-reliable networking with near-instantaneous fault recovery. In this paper it is shown that eDC-NC technology can efficiently and securely broadcast messages in 5G wireless fog-computing-based Radio Access Networks (F-RAN). In particular, this work is directed towards demonstrating the ability of eDC-NC technology to more efficiently provide secure messages broadcasting than standardized methods such as Secure Multicasting using Secret (Shared) Key Cryptography, such that the adversary has no ability to acquire information even if they wiretap the entire F-RAN network (except of course the source and destination nodes). Our results show that using secure eDC-NC technology in F-RAN fronthaul network will enhance secure broadcasting and provide ultra-reliability networking, near-instantaneous fault recovery, and retain the throughput benefits of Network Coding. KEYWORDS 5G, Diversity Coding, Triangular Network Coding, F-RAN, Secure Multicasting 1. INTRODUCTION Many wired and wireless networks securely broadcast/multicast messages to a group of receivers. Several studies [1]-[4] have theoretically analyzed the ability of Network Coding [5] to provide secure broadcasting/multicasting in any wired or wireless network. These papers assume that the number of channels that the eavesdropper can wiretap is equal to or less than the number of tolerated wiretapped channels in the network, which is a design parameter [1]-[4]. However, this assumption is not valid in real networks, as the eavesdropper might have the ability to wiretap the entire network of channels. To overcome this vulnerability, Secret (Shared) Key Cryptography and Network Coding is utilized to provide efficient, secure messages broadcasting. In this study it is shown that Enhanced Diversity and Network Coding (eDC-NC) [6]-[7], which is the synergistic combination of Diversity Coding [8] and modified Triangular Network Coding [9], can efficiently and securely broadcast messages in 5G wireless fog-computing-based Radio Access Networks (F-RANs). F-RANs are an alternative network architecture to Cloud Radio Access Networks (C-RANs) [10]-[12] that are under consideration for 5G networks, where the centralized processing in the baseband unit (BBU) of the C-RAN are replaced by edge nodes with the ability to control, process and store data, and communicate with each other [10]-[12]. It is shown in [6]-[7] that eDC-NC can simultaneously improve the network reliability, reduce computational complexity, enable extremely fast recovery from simultaneous multiple link/node
  • 2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018 2 failures, and retain the throughput improvement of Network Coding for broadcasting/multicasting applications of a F-RAN wireless fronthaul networks. The contribution of this paper is demonstrating the ability of eDC-NC technology to more efficiently provide secure messages broadcasting than standardized methods such as Secure Multicasting [13], such that the adversary cannot acquire any information even if they can wiretap the entire F-RAN network (except of course the source and destination nodes). In this way, eDC-NC will enhance secure broadcasting and provide ultra-reliability networking, near- instantaneous fault recovery, and retain the throughput gain of Network Coding. The structure of this paper is as follows. The system model based on F-RAN wireless fronthaul network is described in Section 2. Section 3 demonstrates the ability of eDC-NC coding to provide secure broadcasting/multicasting followed by the application of secure eDC-NC to F-RAN wireless fronthaul networks in Section 4 and its efficiency analysis in Section 5. The paper ends with the concluding remarks in Section 6. 2. SYSTEM MODEL F-RANs were proposed in [10]-[12] to enhance the performance of C-RANs by migrating a significant number of functions to edge devices and substantially upgrading the Remote Radio Heads (RRHs). These functions include controlling, communicating, measuring, managing, and storing and processing of data. The upgraded RRH is called a Fog Access Point (F-AP), and is able to communicate with other F-APs. One of the benefits of this architecture is decreasing latency by performing functionality at the network edge rather than in the core [10]-[12]. There are three layers in the architecture of F-RANs as illustrated in Figure 1 [10]. The network layer contains the BBU pool, centralized storage, and communication and computing cloud. The F-APs represents the access layer. The terminal layer contains Fog-user equipment (F-UE) that access the F-AP [10]-[11]. Adjacent F-APs can be formed into two topologies: a mesh topology or a tree-like topology. Both of these topologies can significantly minimize the degrading effects of capacity-constrained fronthaul links [10]. Figure 1. F-RAN network architecture.
  • 3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018 3 Although there are different transmission modes in a F-RAN, this paper is focused on the Local Distributed Coordination (LDC) mode, as it is the core mode of the F-RAN as shown in Figure 1 [10]. In the LDC, the F-APs communicate with other F-APs to serve the F-UEs. This will decrease the burden on the fronthaul network and quickly suppress interference or transmit the required data to the UE not from the cloud server but from the F-APs [10]. In [7], eDC-NC coding is applied to a wireless sensor network to provide ultra-reliable with near-instant fault recovery and efficient energy consuming system, and here the ability of eDC-NC to provide efficient secure messages broadcasting and apply secure eDC-NC coding to the LDC fronthaul network is demonstrated, where F-APs are connected to each other in a mesh topology as shown in Figure 2. In this paper, the connections are considered to be wireless links and wiretapped by an eavesdropper. To minimize interference and be able to communicate with each other, such F-APs will likely utilize MIMO technology [14]. Figure 2. Example F-RAN fronthaul network with wireless links. 3. SECURE ENHANCED DC-NC BROADCASTING NETWORK In order to illustrate how Secret (Shared) Key Cryptography is used in eDC-NC type networks and to provides secure broadcasting, consider the point-to-multipoint network topology depicted in Figure 3. Each broadcasting session will have its own secret (shared) session key. The source node (node 1) and the receiver nodes (nodes 5 and 6) will share the broadcasting session key. Controlling the distribution of the keys between the source and the legitimate receivers is a primary issue in any communication network. The IETF Group Domain of Interpretation (GDOI) protocol defined in Request for Comments (RFC-6407) [15] may be used to facilitate connecting the source and the destinations to a key server, where using Public Key Cryptography (PKC) the keys are encrypted and distributed to the members of secure multicast group. The source and the destinations can be authenticated and authorized to form a specific multicast group by the key server such that the shared key is utilized to encrypt and decrypt messages between members of the group [15]. In this way, the broadcasting session (shared) key will be distributed securely to the source and destination nodes.
  • 4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018 4 Figure 3. Example wireless network with secure broadcasting via eDC-NC coding that broadcasts two data streams to nodes 5 and 6 and protects each stream from one link/relay node failure. The solid lines represent the wireless links that carry coded data streams and are used to improve network throughput whereas dashed lines represent the wireless links that carry coded data streams and are used to maximize network reliability. In our example network the source broadcasts two data streams π‘₯1 and π‘₯2 to destination nodes 5 and 6 using relay nodes 2, 3, 4, and 7. The system proceeds as follows: (1) The streams 𝑐1 and 𝑐2 are created using eDC-NC encoding [6], which will be referred to as eDC-NC coded data streams to distinguish them from the encrypted data streams as follows: 𝑐1 = π‘₯1,0 βŠ• π‘₯2,1 (1) 𝑐2 = π‘₯1,0 βŠ• π‘₯2,2 (2) where π‘₯𝑖,π‘Ÿπ‘– represents the raw data stream 𝑖 and π‘Ÿπ‘– is the number of redundant β€œ0” bit(s) that are added at the head of raw data stream 𝑖, 𝑐𝑖 represents the eDC-NC coded data stream 𝑖. Note that the eDC-NC coded data stream, 𝑐2, will be encrypted using the shared key at the source node 1 then it will be transmitted. Therefore, it appears in the figure as 𝑐2 𝑒𝑛𝑐 . (2) The source node (node 1) encrypts the streams π‘₯1, π‘₯2, and 𝑐2 using the Secret (Shared) Key Cryptography algorithm. Node 1 transmits π‘₯1 𝑒𝑛𝑐 and π‘₯2 𝑒𝑛𝑐 to nodes 5 and 6 respectively via relay nodes 2 and 3 respectively. In addition, node 1 transmits 𝑐1 in order to realize the throughput gain provided by eDC-NC networking [6]-[7] and 𝑐2 𝑒𝑛𝑐 to be able to tolerate one link/relay node failure [6]-[7] to the destination nodes 5 and 6 via relay nodes 4 and 7 respectively. (3) At the destination side, for example, node 5 will use the broadcasting session shared key to decrypt the received data streams using the Secret (Shared) Key Cryptography algorithm depending on the following situations: a. If all data streams are correctly received (by checking the CRC), 𝑐2 𝑒𝑛𝑐 is ignored and π‘₯1 𝑒𝑛𝑐 will be decrypted to find π‘₯1. Next, π‘₯2 will be recovered by applying π‘₯1 to 𝑐1 using the eDC-NC decoding algorithm that was explained in detail in [6].
  • 5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018 5 b. If one data stream is either incorrectly received or not received at all (either 𝑐2 𝑒𝑛𝑐 or π‘₯1 𝑒𝑛𝑐 ), the receiver will decrypt the one that is correct (correct CRC) and then apply it to 𝑐1 to obtain π‘₯2 similarly to step a. c. If 𝑐1 fails, the receiver will decrypt both 𝑐2 𝑒𝑛𝑐 and π‘₯1 𝑒𝑛𝑐 to get 𝑐2 and π‘₯1 then similarly to step a apply π‘₯1 to 𝑐2 to obtain π‘₯2. It is worth noting that the intermediate (relay) nodes will not need to decrypt the encrypted raw and eDC-NC coded data streams because they only need to forward them to the destination nodes. Hence, they do not have to be secured. Also, they CANNOT decrypt the encrypted raw and eDC-NC coded data streams because they do not have the broadcasting session secret (shared) key. Now, suppose that the adversary wiretaps the entire network, he/she will have π‘₯1 𝑒𝑛𝑐 , π‘₯2 𝑒𝑛𝑐 , 𝑐1, and 𝑐2 𝑒𝑛𝑐 . Only 𝑐1 is not encrypted but it will not disclose any information because it is a XOR combination of raw data streams π‘₯1 and π‘₯2. The other data streams are encrypted so, the adversary will need to know the broadcasting session secret (shared) key to decrypt them. In this way, as long as the adversary does not possess the broadcasting session key, it will not be able to get any information even if he/she wiretaps the entire network (except of course the source and destination nodes). 4. APPLYING SECURE ENHANCED DC-NC CODING TO F-RANS Enhancing the security (privacy) of transmitted information in 5G wireless F-RAN fronthaul networks is critical due to the vulnerability of wireless links. In addition, although F-APs have specific resources, but these should be used efficiently. Enhanced DC-NC technology was recently utilized to improve the efficiency and reliability of 5G wireless F-RAN fronthaul networks and provide rapid recovery time from multiple simultaneous link/node failures while retaining the throughput enhancement feature of Network Coding for broadcasting applications [6]. Here, secure eDC-NC technology is applied to Local Distributed Coordination (LDC) transmission mode in an F-RAN network to achieve the above benefits and to efficiently improve its security, as depicted in Figure 4. In this example, F-APs are connected to each other in a mesh topology by bi-directional wireless links. Here, a point-to-multipoint network topology models the application of securely broadcasting three data streams π‘₯1, π‘₯2, and π‘₯3 from one F-AP (F-AP1) to three F-APs (F-APs 6, 7, and 8) using intermediate relay nodes F-APs 2, 3, 4, 5, and 9. As mentioned in Section 3, each broadcasting session will have its own secret (shared) session key. The source node (F-AP1) and the receiver nodes (F-APs 6, 7, and 8) will share the broadcasting session key using the GDOI protocol. The system proceeds as follows: (1) The coded data streams 𝑐1, 𝑐2, and 𝑐3 are created using eDC-NC encoding [6] as follows: 𝑐1 = π‘₯1,0 βŠ• π‘₯2,1 βŠ• π‘₯3,2 (3) 𝑐2 = π‘₯1,0 βŠ• π‘₯2,2 βŠ• π‘₯3,1 (4) 𝑐3 = π‘₯1,0 βŠ• π‘₯2,3 βŠ• π‘₯3,5 (5) Note that the eDC-NC coded data stream (𝑐3) will be encrypted using the shared key at F-AP1 then it will be transmitted. Therefore, it appears in the figure as 𝑐3 𝑒𝑛𝑐 .
  • 6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018 6 Figure 4. Example wireless fronthaul Fog-RAN network with secure eDC-NC coding that broadcasts three data streams to F-AP6, F-AP7, and F-AP8 and protects each stream from one link failure. The solid lines represent the links that carry coded data streams and are used to improve network throughput whereas dashed lines represent the links that carry coded data streams and are used to maximize network reliability. (2) F-AP1 encrypts the streams π‘₯1, π‘₯3, and 𝑐3 using the Secret (Shared) Key Cryptography algorithm. Note that data stream π‘₯2 does not need to be encrypted because there is no need to transmit it in a separate link. However, it can be recovered from the coded data streams at the destination F-APs. F-AP1 transmits π‘₯1 𝑒𝑛𝑐 and π‘₯3 𝑒𝑛𝑐 to F-AP6 and F-AP8 respectively via relays F-APs 2 and 3 respectively. In addition, 𝑐1 and 𝑐2 are transmitted to realize the throughput gain provided by eDC-NC [6]-[7] and 𝑐3 𝑒𝑛𝑐 to be able to tolerate one link/relay F-AP failure via eDC-NC [6]-[7] to the destination F-APs 6, 7, and 8 via relays F-APs 4, 5, and 9 respectively. (3) At the destination side, for example, F-AP6 will use the broadcasting session shared key to decrypt the arrived data streams via Secret (Shared) Key Cryptography algorithm based on the following situations: a. If all data streams are correctly received (by checking the CRC), 𝑐3 𝑒𝑛𝑐 is ignored and π‘₯1 𝑒𝑛𝑐 will be decrypted to find π‘₯1. Next, π‘₯2 and π‘₯3 will be recovered using the eDC-NC decoding algorithm that was explained in detail in [6]. b. If one data stream is either incorrectly received or not received at all (either 𝑐3 𝑒𝑛𝑐 or π‘₯1 𝑒𝑛𝑐 ), the receiver will decrypt the one that is correct (by checking the CRC) and then obtain all data streams in similar way of step a. c. If 𝑐1 or 𝑐2 fails, the receiver will decrypt both 𝑐3 𝑒𝑛𝑐 and π‘₯1 𝑒𝑛𝑐 to recover 𝑐3 and π‘₯1 then similarly as in step a obtain π‘₯2 and π‘₯3.
  • 7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018 7 As it is mentioned in Section 3, the intermediate (relay) F-APs will not need to decrypt the encrypted raw and eDC-NC coded data streams because they only need to forward the streams to the destination F-APs. Also, they CANNOT decrypt the encrypted raw and eDC-NC coded data streams because they do not have the broadcasting session secret (shared) key. Now, assuming that the eavesdropper wiretaps the entire network, he/she will have π‘₯1 𝑒𝑛𝑐 , π‘₯3 𝑒𝑛𝑐 , 𝑐1, 𝑐2 and 𝑐3 𝑒𝑛𝑐 . Although 𝑐1 and 𝑐2 are not encrypted, no information can be disclosed because they are XOR combinations of raw data streams π‘₯1, π‘₯2, and π‘₯3. Other data streams are encrypted so, the eavesdropper will need to know the broadcasting session secret (shared) key to decrypt them. In this way, as long as the adversary does not have the broadcasting session key, it will not be able to get any information even if he/she wiretaps the entire network (except, of course, the source and destination nodes). Consequently, secure eDC-NC will efficiently enable secure broadcasting and provide ultra- reliability networking, near-instantaneous fault recovery, and re the throughput gain of Network Coding of 5G wireless F-RAN fronthaul networks. 5. EFFICIENCY ANALYSIS Normally, when standard Secure Multicast [13] is utilized to provide network security, the source has to encrypt all transmitted data streams. However, by applying eDC-NC, the source node does not need to encrypt all the streams as shown in Section 3 and 4. In the example network in Section 3, only three out of four data streams have to be encrypted, namely π‘₯1, π‘₯2, and 𝑐2. The reason for encrypting only three data streams is that the eDC-NC coded data streams 𝑐1 and 𝑐2 are not plaintext but the mod 2 combination of the raw data streams π‘₯1 and π‘₯2. So, encrypting one stream (𝑐2 𝑒𝑛𝑐 ) in this example network will make recovering the raw data streams impossible without knowledge of the broadcasting session key to decrypt 𝑐2 𝑒𝑛𝑐 and thus be able to recover both raw data streams via the eDC-NC decoding algorithm [6]. In this way, the cost/complexity of encryption will be decreased by 25%. At the receiver, each destination node has only to decrypt two out of three data streams as a maximum as illustrated in case c in Section 3 above. Hence, the cost of decryption will be maximum and for two broadcast data streams, there will be no cost benefits in decryption, (however, for three broadcast data stream, the decryption cost will be decreased by 33.33%) which is referred to as a minimum decryption cost benefits (Min. DecCB). However, in some cases, the destination node has only to decrypt one data stream (cases a and b in Section 3) which decreases the decryption cost by 50%. In this case, the cost of decryption will be a minimum and there will be 50% decryption cost benefit, which is referred to as a maximum decryption cost benefits (Max. DecCB). Note that the encryption cost benefit will not vary once the system parameters are fixed because the source node always needs to encrypt only two raw data streams and once the number of eDC-NC encoded data stream(s) that will be used to improve the system reliability has been selected (that is, the number of link failures that can be tolerated) the benefit will be determined. In general, for point-to-multipoint network topology, in order to quantify the security cost benefits, we need to define the following variables:
  • 8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018 8 π·π‘‘π‘œπ‘‘π‘Žπ‘™: Number of overall transmitted data streams. 𝐷𝑒𝑛𝑐: Number of encrypted (raw and eDC-NC coded) data streams. π·π‘Ÿπ‘Žπ‘€: Number of broadcast raw data streams. 𝐿 𝑓: Number of link failures that can be tolerated in the network. 𝐷 𝑑𝑒𝑐: Number of decrypted data streams. Therefore, the security cost benefit can be calculated as follows: The encryption cost benefits (EncCB) in percentage is: 𝐸𝑛𝑐𝐢𝐡 % = π·π‘‘π‘œπ‘‘π‘Žπ‘™ βˆ’ 𝐷𝑒𝑛𝑐 π·π‘‘π‘œπ‘‘π‘Žπ‘™ Γ— 100 (6) where π·π‘‘π‘œπ‘‘π‘Žπ‘™ = π·π‘Ÿπ‘Žπ‘€ + 𝐿 𝑓 + 1 (7) and 𝐷𝑒𝑛𝑐 = 𝐿 𝑓 + 2 (8) Hence, 𝐸𝑛𝑐𝐢𝐡 % = π·π‘Ÿπ‘Žπ‘€ βˆ’ 1 π·π‘Ÿπ‘Žπ‘€ + 𝐿 𝑓 + 1 Γ— 100 (9) The decryption cost benefits (DecCB) in percentage at each destination node is: 𝐷𝑒𝑐𝐢𝐡 % = π·π‘Ÿπ‘Žπ‘€ βˆ’ 𝐷 𝑑𝑒𝑐 π·π‘Ÿπ‘Žπ‘€ Γ— 100 (10) where 𝐷 𝑑𝑒𝑐 = { 1 𝑖𝑓 π‘‘π‘’π‘ π‘‘π‘–π‘›π‘Žπ‘‘π‘–π‘œπ‘› π‘›π‘œπ‘‘π‘’ β„Žπ‘Žπ‘  π‘›π‘œ π‘™π‘–π‘›π‘˜ π‘“π‘Žπ‘–π‘™π‘’π‘Ÿπ‘’ 𝑂𝑅 π‘œπ‘›π‘™π‘¦ π‘œπ‘›π‘’ π‘’π‘›π‘π‘Ÿπ‘¦π‘π‘‘π‘’π‘‘ π‘‘π‘Žπ‘‘π‘Ž π‘ π‘‘π‘Ÿπ‘’π‘Žπ‘š 𝑖𝑠 π‘™π‘œπ‘ π‘‘ 𝐿 𝑓 + 1 π‘œπ‘‘β„Žπ‘’π‘Ÿπ‘€π‘–π‘ π‘’ , Table 1 shows the security cost benefits in percentage for tolerance of one link failure and different numbers of broadcast data streams. Table 1. The security cost benefits in percentage for one link failure tolerance. Number of broadcast data streams Number of overall data streams Number of encrypted data streams EncCB (%) Min. DecCB (%) Max. DecCB (%) 2 4 3 25 0 50 3 5 3 40 33.33 66.67 4 6 3 50 50 75 5 7 3 57.14 60 80 6 8 3 62.5 66.67 83.3
  • 9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018 9 Figures 5 and 6 illustrate the relationship between the encryption and decryption cost benefits percentage respectively and the number of broadcast data streams. Note that by applying Secure Multicast [13], all data streams have to be encrypted at the source and decrypted at the destination nodes. However, Figure 5 and Figure 6 show that by applying Secret (Shared) Key Cryptography to the eDC-NC broadcast networks, there are always security cost benefits (except in the case of minimum decryption cost for broadcasting two data streams). Also, they depict the scalability of eDC-NC by decreasing of the security costs with the increasing the number of broadcast data streams. Figure 5. eDC-NC encryption cost benefits. Figure 6. eDC-NC decryption cost benefits. However, the security costs will increase with increasing the number of link failures that need to be tolerated as shown in Figure 7 and Figure 8.
  • 10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018 10 Figure 7. eDC-NC encryption cost benefits for different number of tolerant links. Figure 8. eDC-NC minimum decryption cost benefits for different number of tolerant links. 6. CONCLUSIONS This study presented efficient secure broadcasting via eDC-NC technology for 5G wireless F-RAN fronthaul networks such that the adversary has no ability to acquire any information even if they wiretap the entire fronthaul network (except of course the source and destination F-APs). The security of the broadcasting data streams is obtained with lower security cost compared to that of the standard Secure Multicast protocols. Enhanced secure broadcasting using eDC-NC in F-RAN wireless fronthaul networks provides ultra-reliable communications, near-instantaneous link/node failure recovery, and retains the throughput gains of Network Coding.
  • 11. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018 11 ACKNOWLEDGEMENTS Nabeel I. Sulieman is supported by the Higher Committee for Education Development in Iraq (HCED-IRAQ). REFERENCES [1] N. Cai and W. Yeung, β€œSecure Network Coding”, IEEE International Symposium on Information Theory (ISIT), Lausanne, Switzerland, July 2002, pp. 323. [2] L. Czap, C. Fragouli, V. M. Prabhakaran, and S. Diggavi, β€œSecure Network Coding with Erasures and Feedback”, 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA, Oct. 2013, pp. 1517-1524. [3] C. Fargouli and E. Soljanin, β€œ(Secure) Linear network coding multicast,” Springer International Journal of Designs, Codes, and Cryptography, vol. 78, issue. 1, pp. 269-310, Jan. 2016. [4] S. Rouayheb, E. Soljanin, and A. Sprintson, β€œSecure Network Coding for Wiretap Networks of Type II,” IEEE Transactions on Information Theory, vol. 58(3), pp. 1361-1371, March 2012. [5] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, β€œNetwork information flow,” IEEE Transactions on Information Theory, vol. 46, no. 4, July 2000. [6] N. I. Sulieman, E. Balevi, and R. D. Gitlin, β€œNear-instant link failure recovery in 5G wireless Fog-base- fronthaul networks,” IEEE Wireless Telecommunication Symposium, Phoenix, AZ, April 2018. [7] N. I. Sulieman and R. D. Gitlin, β€œUltra-reliable and energy efficient wireless sensor networks,” IEEE Wireless and Microwave Technology Conference, Sand Key, FL, April 2018. [8] E. Ayanoglu, C.-L. I, R. D. Gitlin, and J. E. Mazo, β€œDiversity Coding for transparent self-healing and fault-tolerant communication networks,” IEEE Trans. Commun., vol. 41, pp. 1677–1686, Nov. 1993. [9] J. Qureshi, C. H. Foh, and J. Cai, "Optimal solution for the Index Coding problem using Network Coding over GF(2)," 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Seoul, South Korea, June 2012, pp. 209–217. [10] M. Peng, S. Yan, K. Zhang, and C. Wang, β€œFog-computing-based radio access networks: issues and challenges,” IEEE Netw., vol. 30, no. 4, pp. 46-53, Jul./Aug. 2016. [11] M. Peng and K. Zhang, β€œRecent advances in fog radio access networks: performance analysis and radio resource allocation,” IEEE Access, vol. 4, pp. 5003-5009, Aug. 2016. [12] T. Chiu, W. Chung, A. Pang, Y. Yu, and P. Yen, β€œUltra-low latency services provision in 5G fog-radio access networks,” IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Valencia, Spain, Sep. 2016. [13] Cisco System, β€œCisco IOS Secure Multicast,” whitepaper, 2006. [Online]. Available: https://www.cisco.com/c/en/us/products/collateral/ios-nx-os-software/ip- multicast/prod_white_paper0900aecd8047191e.html [14] Ezio Biglieri, Robert Calderbank, Anthony Constantinides, Andrea Goldsmith, Arogyaswami Paulraj, and H. Vincent Poor, MIMO wireless communications. Cambridge University Press, 2007. [15] B. Weis, S. Rowles, and T. Hardjono, β€œThe Group Domain of Interpretation,” RFC 6407, IETF, October 2011.
  • 12. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 10, No. 3, June 2018 12 AUTHORS Nabeel I. Sulieman received his B.S. degree in Electrical Engineering from University of Baghdad, Baghdad – Iraq in 1998, he was one of the ten highest ranked students in the Electrical Engineering Department, and he received his M.S. degree with merit in wireless communications systems from Brunel University, London – UK in 2008. From 2002 until 2014, he worked for Iraqi Telecommunication and Post Company as a technical support engineer. In addition, he worked as an instructor for short technical courses in Higher Institute of Telecommunications-Baghdad-Iraq. Currently, he is a Ph.D. Candidate in Electrical Engineering Department at the University of South Florida in the Innovations in Wireless Information Networking Laboratory (iWINLAB) under the supervision of Dr. Richard Gitlin, and his research interests include Diversity Coding, Network Coding, 5G Wireless Fronthaul Networks, Synchronization of Diversity and Network Coding, Software Defined Networking (SDN), and Network Function Virtualization (NFV). Richard D. Gitlin is a State of Florida 21st Century World Class Scholar, Distinguished University Professor and the Agere Systems Chaired Distinguished Professor of Electrical Engineering at the University of South Florida. He has more than 45 years of leadership in the communications and networking industry. He was at Bell Labs/Lucent Technologies for 32-years performing and leading pioneering research and development in digital communications, broadband networking, and wireless systems. Dr. Gitlin was Senior VP for Communications and Networking Research at Bell Labs and later CTO of Lucent's Data Networking Business Unit. After retiring from Lucent, he was visiting professor of Electrical Engineering at Columbia University, where he supervised several doctoral students and research projects and then Chief Technology Officer of Hammerhead Systems, a venture funded networking company in Silicon Valley. Since joining USF in 2008, he has focused on the intersection of communications with medicine and created an interdisciplinary team that is focused on wireless networking of in vivo miniature wirelessly controlled devices to advance minimally invasive surgery and other cyber-physical health care systems. Dr. Gitlin has also directed research on advancing wireless local and 4G and 5G cellular systems by increasing their reliability and capacity. Dr. Gitlin is a member of the National Academy of Engineering (NAE), a Fellow of the IEEE, a Bell Laboratories Fellow, a Charter Fellow of the National Academy of Inventors (NAI), and a member of the Florida Inventors Hall of Fame. He is also a co-recipient of the 2005 Thomas Alva Edison Patent Award and the S.O. Rice prize, has co-authored a text, published ~150 papers and holds 65 patents.