A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells
Parsamehr, Reza ORCID: https://orcid.org/0000-0002-3461-433X, Esfahani, Alireza ORCID: https://orcid.org/0000-0002-2100-1569, Mantas, Georgios ORCID: https://orcid.org/0000-0002-8074-0417, Radwan, Ayman ORCID: https://orcid.org/0000-0003-1935-6077, Mumtaz, Shahid ORCID: https://orcid.org/0000-0001-6364-6149, Rodriguez, Jonathan ORCID: https://orcid.org/0000-0001-9829-0955 and Martinez-Ortega, Jose-Fernan ORCID: https://orcid.org/0000-0002-7635-4564 (2019) A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells. IEEE Transactions on Computational Social Systems, 6 (6). pp. 1467-1477. ISSN 2373-7476 (Print), 2329-924X (Online) (doi:10.1109/TCSS.2019.2949153)
Preview |
PDF (Author's accepted manuscript)
33520_MANTAS_A_novel_intrusion_detection_and_prevention_scheme_for_network_coding_enabled_mobile_small_cells.pdf - Accepted Version Download (5MB) | Preview |
Abstract
Network coding (NC)-enabled mobile small cells are observed as a promising technology for fifth-generation (5G) networks that can cover the urban landscape by being set up on demand at any place and at any time on any device. Nevertheless, despite the significant benefits that this technology brings to the 5G of mobile networks, major security issues arise due to the fact that NC-enabled mobile small cells are susceptible to pollution attacks; a severe security threat exploiting the inherent vulnerabilities of NC. Therefore, intrusion detection and prevention mechanisms to detect and mitigate pollution attacks are of utmost importance so that NC-enabled mobile small cells can reach their full potential. Thus, in this article, we propose for the first time, to the best of our knowledge, a novel intrusion detection and prevention scheme (IDPS) for NC-enabled mobile small cells. The proposed scheme is based on a null space-based homomorphic message authentication code (MAC) scheme that allows detection of pollution attacks and takes proper risk mitigation actions when an intrusive incident is detected. The proposed scheme has been implemented in Kodo and its performance has been evaluated in terms of computational overhead.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | 5G communications, homomorphic messagevauthentication codes (MACs), intrusion detection and prevention, mobile small cells, pollution attacks, random linear network coding |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software |
Faculty / School / Research Centre / Research Group: | Faculty of Engineering & Science Faculty of Engineering & Science > School of Engineering (ENG) |
Related URLs: | |
Last Modified: | 30 May 2022 09:26 |
URI: | http://gala.gre.ac.uk/id/eprint/33520 |
Actions (login required)
View Item |
Downloads
Downloads per month over past year