2019
DOI: 10.1109/tcss.2019.2949153
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Intrusion Detection and Prevention Scheme for Network Coding-Enabled Mobile Small Cells

Abstract: Network coding (NC)-enabled mobile small cells are observed as a promising technology for fifth-generation (5G) networks that can cover the urban landscape by being set up ondemand at any place and at any time on any device. Nevertheless, despite the significant benefits that this technology brings to the 5G of mobile networks, major security issues arise due to the fact that NC-enabled mobile small cells are susceptible to pollution attacks; a severe security threat exploiting the inherent vulnerabilities of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
37
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 27 publications
(37 citation statements)
references
References 37 publications
0
37
0
Order By: Relevance
“…An integrity scheme which identifies the exact location of the malicious user and notifies other participant nodes in the network about the attacker with the help of a central controller is presented in [16]. Other parallel works in this direction to address security challenges in a network coding enabled mobile small cell environment are based on a null space-based homomorphic MAC schemes [17], [18] which not only detect the pollution attack but also identify the adversary's location.…”
Section: Background and Related Workmentioning
confidence: 99%
“…An integrity scheme which identifies the exact location of the malicious user and notifies other participant nodes in the network about the attacker with the help of a central controller is presented in [16]. Other parallel works in this direction to address security challenges in a network coding enabled mobile small cell environment are based on a null space-based homomorphic MAC schemes [17], [18] which not only detect the pollution attack but also identify the adversary's location.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The mechanism is described in section IV precisely. Moreover, the proposed IDLP mechanism is Implemented on Kodo and is compared with the proposed IDPS scheme in [1].…”
Section: Introductionmentioning
confidence: 99%
“…However, the proposed IDLP mechanism is efficient because, in its initial phase (i.e., Phase 1), it is not needed to be applied to all mobile devices in order to protect the NC-enabled mobile small cells from the depletion of their resources. The proposed efficient IDLP mechanism has been implemented in Kodo, and its performance has been evaluated and compared with our previous IDPS scheme proposed in [1], in terms of computational complexity, communicational overhead, and successfully decoding probability as well.…”
mentioning
confidence: 99%
“…For the efficient deployment of a large number of fronthaul links, wireless links have been studied in addition to conventional optical links [3]. To ensure the security of 5G mobile networks, network coding (NC)-enabled small cells are proposed for intrusion detection and prevention [4].…”
Section: Introductionmentioning
confidence: 99%