2018
DOI: 10.1007/978-3-030-05195-2_33
|View full text |Cite
|
Sign up to set email alerts
|

Security Threats in Network Coding-Enabled Mobile Small Cells

Abstract: The recent explosive growth of mobile data traffic, the continuously growing demand for higher data rates, and the steadily increasing pressure for higher mobility have led to the fifth-generation mobile networks. To this end, network-coding (NC)-enabled mobile small cells are considered as a promising 5G technology to cover the urban landscape by being set up on-demand at any place, and at any time on any device. In particular, this emerging paradigm has the potential to provide significant benefits to mobile… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 34 publications
0
12
0
Order By: Relevance
“…In data pollution attacks, the adversary tries to pollute (e.g., modify) the data packets being transferred. However, in tag pollution attacks, the adversary pollutes the tags attached to the packets to prevent the destination nodes from decoding correctly, which results in reduced efficiency of the network [15], [28], [29]. Furthermore, both types of pollution attacks can be launched by either an external adversary or an internal compromised node (i.e., byzantine modification attacks).…”
Section: A Pollution Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…In data pollution attacks, the adversary tries to pollute (e.g., modify) the data packets being transferred. However, in tag pollution attacks, the adversary pollutes the tags attached to the packets to prevent the destination nodes from decoding correctly, which results in reduced efficiency of the network [15], [28], [29]. Furthermore, both types of pollution attacks can be launched by either an external adversary or an internal compromised node (i.e., byzantine modification attacks).…”
Section: A Pollution Attacksmentioning
confidence: 99%
“…The external adversary tries to inject corrupted packets into the network in order to corrupt other coded packets. However, an internal compromised node aims to pollute the transmitted packets by modifying them and thus compromising their integrity [15], [28], [29].…”
Section: A Pollution Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Some of these challenges like pollution attacks are extremely severe in network coding scenario compared to normal switching networks since the packets in transition are being coded at intermediate nodes. In this section, we analyse some commonly known security challenges from the perspective of a network coded environment summerizing some of the existing works on the security of network coding [19]- [21] and also discuss the pollution attack as a special case of security challenges.…”
Section: Secure Network Coding and Pollution Attacksmentioning
confidence: 99%
“…This paper analyses the security challenges of network coded cooperation for mobile small cells with emphasis on pollution attacks. Even though there have been some interesting surveys on the security of network coding implementations [19]- [21], an extensive study focused on pollution attacks and countermeasures on the background of upcoming 5G and beyond network requirements is still valid. This paper focuses on different types of pollution attacks in the network coding environment and discusses some of the major countermeasures against pollution attacks in the literature, in detail with comparisons.…”
Section: Introductionmentioning
confidence: 99%