Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/588786
Title: Detection and Mitigation of Pollution Attacks in Network Coding Enabled Small Cell Networks
Researcher: Kiran Kumar, Chanumolu
Guide(s): Nandha Kumar, R
Keywords: 5G
Network Coding
Small Cells
University: Vellore Institute of Technology (VIT-AP)
Completed Date: 2024
Abstract: Strong network-based system operations are becoming more important due to the rising newlinereliance on network technology in everyday life and the rapid pace of technical newlineadvancement. The Comprehensive Error Rate Test Report states that the annual attack newlinecount nearly quadruples due to the increasing frequency of network attacks. A world newlineconnected with nearly zero latency will be available with fifth-generation (5G) mobile newlinecommunication. The demands of next-generation networking technology, which primarily newlineconcern efficiency and security, have given rise to Network Coding (NC) as a newlinepotential solution. For efficient data communication, a small cell environment with NC newlineis ideal. Intrusion Detection System (IDS) are a crucial defense against various types newlineof network intrusions. A unique IDS that is both lightweight and secure is thus required. newlineThe Homomorphic Message Authentication Code (HMAC) is quite popular as newlinean alternate. Tag pollution attacks allow hackers to elude detection by manipulating newlinethe end-of-packet tags, which can affect HMAC. Utilizing an HMAC-based approach newlinewith two distinct MAC tags helps thwart attacks on data and tag pollution. A major newlinesecurity risk that intrusions pose is that they take advantage of the weaknesses that NC newlinehas inherently. IDS s must be set up to detect intrusions if NC-enabled mobile small newlinecells are to reach their maximum potential. HMACs are commonly used in this field newlinebecause they offer safe NC techniques with less overheads than homomorphic signature newlineor hashing systems. Pollution attacks, in which intermediate nodes are utilized to newlinemanipulate packets in transit, pose considerable security dangers to NC-enabled mobile newlinesmall cells, despite the benefits they bring to 5G mobile networks. Therefore, in newlineorder for NC-enabled mobile small cells to achieve their full potential, IDS s that can newlineidentify pollution attacks are of the utmost importance. Thus, in this research, an Intrusion newlineSignalling System by using Adaptable Homomorphic MAC (ISS-AH-MAC) for newlineaccurate detection of intrusions in th
Pagination: xiii,163
URI: http://hdl.handle.net/10603/588786
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
10_chapter-6.pdfAttached File897.34 kBAdobe PDFView/Open
11_chapter-7.pdf1.03 MBAdobe PDFView/Open
12_annexures.pdf118.61 kBAdobe PDFView/Open
1_title.pdf351.06 kBAdobe PDFView/Open
2_prelim pages.pdf109.03 kBAdobe PDFView/Open
3_content.pdf49.45 kBAdobe PDFView/Open
4_abstract.pdf63.09 kBAdobe PDFView/Open
5_chapter-1.pdf893.27 kBAdobe PDFView/Open
6_chapter-2.pdf142.95 kBAdobe PDFView/Open
7_chapter-3.pdf2.31 MBAdobe PDFView/Open
80_recommendation.pdf47.72 kBAdobe PDFView/Open
8_chapter-4.pdf830.12 kBAdobe PDFView/Open
9_chapter-5.pdf1.56 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: