4.6 Article

A Novel Intrusion Detection and Prevention Scheme for Network Coding-Enabled Mobile Small Cells

期刊

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCSS.2019.2949153

关键词

Fifth generation (5G); homomorphic message authentication codes (MACs); intrusion detection and prevention; mobile small cells; pollution attacks; random linear network coding (RLNC)

资金

  1. European Union's Horizon 2020 Research and Innovation Program [H2020-MSCA-ITN-2016-SECRET-722424]
  2. European Regional Development Fund (FEDER) through the Competitiveness and Internationalization Operational Program (COMPETE 2020)
  3. European Regional Development Fund (FEDER) through Regional Operational Program of the Algarve (2020)
  4. Fundacao para a ciencia e Tecnologia
  5. i-Five: Extensao do Acesso de Espectro Dinamico para Radio 5G [POCI-01-0145-FEDER-030500]

向作者/读者索取更多资源

Network coding (NC)-enabled mobile small cells are observed as a promising technology for fifth-generation (5G) networks that can cover the urban landscape by being set up on-demand at any place and at any time on any device. Nevertheless, despite the significant benefits that this technology brings to the 5G of mobile networks, major security issues arise due to the fact that NC-enabled mobile small cells are susceptible to pollution attacks; a severe security threat exploiting the inherent vulnerabilities of NC. Therefore, intrusion detection and prevention mechanisms to detect and mitigate pollution attacks are of utmost importance so that NC-enabled mobile small cells can reach their full potential. Thus, in this article, we propose for the first time, to the best of our knowledge, a novel intrusion detection and prevention scheme (IDPS) for NC-enabled mobile small cells. The proposed scheme is based on a null space-based homomorphic message authentication code (MAC) scheme that allows detection of pollution attacks and takes proper risk mitigation actions when an intrusive incident is detected. The proposed scheme has been implemented in Kodo and its performance has been evaluated in terms of computational overhead.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据