A Novel Intrusion Detection and Prevention Scheme for Network Coding-Enabled Mobile Small Cells

作者: Reza Parsamehr , Alireza Esfahani , Georgios Mantas , Ayman Radwan , Shahid Mumtaz

DOI: 10.1109/TCSS.2019.2949153

关键词:

摘要: Network coding (NC)-enabled mobile small cells are observed as a promising technology for fifth-generation (5G) networks that can cover the urban landscape by being set up on-demand at any place and time on device. Nevertheless, despite significant benefits this brings to 5G of networks, major security issues arise due fact NC-enabled susceptible pollution attacks; severe threat exploiting inherent vulnerabilities NC. Therefore, intrusion detection prevention mechanisms detect mitigate attacks utmost importance so reach their full potential. Thus, in article, we propose first time, best our knowledge, novel scheme (IDPS) cells. The proposed is based null space-based homomorphic message authentication code (MAC) allows takes proper risk mitigation actions when an intrusive incident detected. has been implemented Kodo its performance evaluated terms computational overhead.

参考文章(39)
Morten V. Pedersen, Janus Heide, Frank H. P. Fitzek, Kodo: an open and research oriented network coding library international conference on networking. ,vol. 6827, pp. 145- 152 ,(2011) , 10.1007/978-3-642-23041-7_15
T. Ho, D.R. Karger, M. Medard, R. Koetter, Network coding from a network flow perspective international symposium on information theory. pp. 441- ,(2003) , 10.1109/ISIT.2003.1228458
C. Gkantsidis, P. Rodriguez Rodriguez, Cooperative Security for Network Coding File Distribution ieee international conference computer and communications. pp. 1- 13 ,(2006) , 10.1109/INFOCOM.2006.233
Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Médard, Jon Crowcroft, XORs in the air: practical wireless network coding acm special interest group on data communication. ,vol. 36, pp. 243- 254 ,(2006) , 10.1145/1151659.1159942
João P. Vilela, João Barros, Paulo F. Oliveira, Luísa Lima, Network Coding Security: Attacks and Countermeasures arXiv: Cryptography and Security. ,(2008)
Jeppe Krigslund, Muriel Medard, Daniel E. Lucani, Jonas Hansen, Frank H. P. Fitzek, Network Coded Software Defined Networking: Design and Implementation european wireless conference. pp. 1- 6 ,(2015)
Alireza Esfahani, Georgios Mantas, Valdemar Monteiro, Kostas Ramantasy, Eftychia Datsikay, Jonathan Rodriguez, Analysis of a Homomorphic MAC-based scheme against tag pollution in RLNC-enabled wireless networks computer aided modeling and design of communication links and networks. pp. 156- 160 ,(2015) , 10.1109/CAMAD.2015.7390500
Alireza Esfahani, Georgios Mantas, Jonathan Rodriguez, An Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC IEEE Communications Letters. ,vol. 20, pp. 918- 921 ,(2016) , 10.1109/LCOMM.2016.2547420
Alireza Esfahani, Georgios Mantas, Hélio Silva, Jonathan Rodriguez, Jose Carlos Neves, An efficient MAC-based scheme against pollution attacks in XOR network coding-enabled WBANs for remote patient monitoring systems Eurasip Journal on Wireless Communications and Networking. ,vol. 2016, pp. 113- ,(2016) , 10.1186/S13638-016-0601-9