Skip navigation

A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells

A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells

Parsamehr, Reza ORCID: 0000-0002-3461-433X, Esfahani, Alireza ORCID: 0000-0002-2100-1569, Mantas, Georgios ORCID: 0000-0002-8074-0417, Radwan, Ayman ORCID: 0000-0003-1935-6077, Mumtaz, Shahid ORCID: 0000-0001-6364-6149, Rodriguez, Jonathan ORCID: 0000-0001-9829-0955 and Martinez-Ortega, Jose-Fernan ORCID: 0000-0002-7635-4564 (2019) A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells. IEEE Transactions on Computational Social Systems, 6 (6). pp. 1467-1477. ISSN 2373-7476 (Print), 2329-924X (Online) (doi:https://doi.org/10.1109/TCSS.2019.2949153)

[img]
Preview
PDF (Author's accepted manuscript)
33520_MANTAS_A_novel_intrusion_detection_and_prevention_scheme_for_network_coding_enabled_mobile_small_cells.pdf - Accepted Version

Download (5MB) | Preview

Abstract

Network coding (NC)-enabled mobile small cells are observed as a promising technology for fifth-generation (5G) networks that can cover the urban landscape by being set up on demand at any place and at any time on any device. Nevertheless, despite the significant benefits that this technology brings to the 5G of mobile networks, major security issues arise due to the fact that NC-enabled mobile small cells are susceptible to pollution attacks; a severe security threat exploiting the inherent vulnerabilities of NC. Therefore, intrusion detection and prevention mechanisms to detect and mitigate pollution attacks are of utmost importance so that NC-enabled mobile small cells can reach their full potential. Thus, in this article, we propose for the first time, to the best of our knowledge, a novel intrusion detection and prevention scheme (IDPS) for NC-enabled mobile small cells. The proposed scheme is based on a null space-based homomorphic message authentication code (MAC) scheme that allows detection of pollution attacks and takes proper risk mitigation actions when an intrusive incident is detected. The proposed scheme has been implemented in Kodo and its performance has been evaluated in terms of computational overhead.

Item Type: Article
Uncontrolled Keywords: 5G communications, homomorphic messagevauthentication codes (MACs), intrusion detection and prevention, mobile small cells, pollution attacks, random linear network coding
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Q Science > QA Mathematics > QA76 Computer software
Faculty / Department / Research Group: Faculty of Engineering & Science
Faculty of Engineering & Science > School of Engineering (ENN)
Related URLs:
Last Modified: 12 Aug 2021 11:32
Selected for GREAT 2016: None
Selected for GREAT 2017: None
Selected for GREAT 2018: None
Selected for GREAT 2019: None
Selected for REF2021: None
URI: http://gala.gre.ac.uk/id/eprint/33520

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics