2020
DOI: 10.1109/access.2020.2977428
|View full text |Cite
|
Sign up to set email alerts
|

IDLP: An Efficient Intrusion Detection and Location-Aware Prevention Mechanism for Network Coding-Enabled Mobile Small Cells

Abstract: Mobile small cell technology is considered as a 5G enabling technology for delivering ubiquitous 5G services in a cost-effective and energy efficient manner. Moreover, Network Coding (NC) technology can be foreseen as a promising solution for the wireless network of mobile small cells to increase its throughput and improve its performance. However, NC-enabled mobile small cells are vulnerable to pollution attacks due to the inherent vulnerabilities of NC. Although there are several works on pollution attack de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
15
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(17 citation statements)
references
References 41 publications
0
15
0
Order By: Relevance
“…In the following section, "IDLP: An Efficient Intrusion Detection and Location-aware Prevention Mechanism for Network Coding-enabled Mobile Small Cells" [2], and "Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac" [1] will be briefly summarized.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…In the following section, "IDLP: An Efficient Intrusion Detection and Location-aware Prevention Mechanism for Network Coding-enabled Mobile Small Cells" [2], and "Cooperative Defense Against Pollution Attacks in Network Coding Using SpaceMac" [1] will be briefly summarized.…”
Section: Related Workmentioning
confidence: 99%
“…Thus, detection of the pollution attacks and the exact location of attackers are important for intrusion detection and location-aware mechanisms in NC-enabled MSC. Although there are many schemes against pollution attacks [4]- [10], there are only few focusing on identifying the location of malicious users [1], [2], [11]- [13].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…An integrity scheme which identifies the exact location of the malicious user and notifies other participant nodes in the network about the attacker with the help of a central controller is presented in [16]. Other parallel works in this direction to address security challenges in a network coding enabled mobile small cell environment are based on a null space-based homomorphic MAC schemes [17], [18] which not only detect the pollution attack but also identify the adversary's location.…”
Section: Background and Related Workmentioning
confidence: 99%