Network Security

Design of Network Provenance Block

A high-level block diagram to depict the network provenance functionality is given in the figure below. As the first step, the UEs connect to their neighbors and then assist the RSU to learn the topology of the network, i.e. the graph of the underlying network. To execute this task, we could either implement the Single Source Multiple Packets (SSMP) protocol or the Multiple Source Single Packet (MSSP) protocols. Once the topology learning is executed, the RSU computes the appropriate parameters of the Bloom filters and then distribute it to the UEs so that provenance embedding algorithms can be executed by the UEs. The sequence of steps to be followed are

  1. Neighbor discovery phase

  2. SSMP or MSSP modules

  3. Single-edge and double-edge embedding methods for provenance recovery

  4. Provenance recovery modules at the RSU


Unlike the case of 5G AKA or physical-layer key generation, this functionality requires multiple nodes to work in coordination with the RSU. The underlying coordination has been orchestrated in a deterministic manner for the sake of proof of concept.

: Sequence of steps to execute the network provenance embedding methods

Sequence of modules to execute provenance recovery at the RSU

Related Publications:


  1. J. Harshan, Amogh Vithalkar, Naman Jhunjhunwala, Manthan Kabra, Prafull Manav, and Yih-Chun Hu,``Double-Edge Embedding Based Provenance Recovery for Low-Latency Applications in Wireless Networks," IEEE Transactions on Dependable and Secure Computing, 2020.

  2. J. Harshan, Amogh Vithalkar, Naman Jhunjhunwala, Manthan Kabra, Prafull Manav, and Yih-Chun Hu,``Bloom Filter Based Low-Latency Provenance Embedding Schemes in Wireless Networks," in the Proc. of IEEE Wireless Communications and Networking Conference (IEEE WCNC), 2020.