Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/588786
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2024-09-12T06:45:00Z-
dc.date.available2024-09-12T06:45:00Z-
dc.identifier.urihttp://hdl.handle.net/10603/588786-
dc.description.abstractStrong network-based system operations are becoming more important due to the rising newlinereliance on network technology in everyday life and the rapid pace of technical newlineadvancement. The Comprehensive Error Rate Test Report states that the annual attack newlinecount nearly quadruples due to the increasing frequency of network attacks. A world newlineconnected with nearly zero latency will be available with fifth-generation (5G) mobile newlinecommunication. The demands of next-generation networking technology, which primarily newlineconcern efficiency and security, have given rise to Network Coding (NC) as a newlinepotential solution. For efficient data communication, a small cell environment with NC newlineis ideal. Intrusion Detection System (IDS) are a crucial defense against various types newlineof network intrusions. A unique IDS that is both lightweight and secure is thus required. newlineThe Homomorphic Message Authentication Code (HMAC) is quite popular as newlinean alternate. Tag pollution attacks allow hackers to elude detection by manipulating newlinethe end-of-packet tags, which can affect HMAC. Utilizing an HMAC-based approach newlinewith two distinct MAC tags helps thwart attacks on data and tag pollution. A major newlinesecurity risk that intrusions pose is that they take advantage of the weaknesses that NC newlinehas inherently. IDS s must be set up to detect intrusions if NC-enabled mobile small newlinecells are to reach their maximum potential. HMACs are commonly used in this field newlinebecause they offer safe NC techniques with less overheads than homomorphic signature newlineor hashing systems. Pollution attacks, in which intermediate nodes are utilized to newlinemanipulate packets in transit, pose considerable security dangers to NC-enabled mobile newlinesmall cells, despite the benefits they bring to 5G mobile networks. Therefore, in newlineorder for NC-enabled mobile small cells to achieve their full potential, IDS s that can newlineidentify pollution attacks are of the utmost importance. Thus, in this research, an Intrusion newlineSignalling System by using Adaptable Homomorphic MAC (ISS-AH-MAC) for newlineaccurate detection of intrusions in th
dc.format.extentxiii,163
dc.languageEnglish
dc.relation
dc.rightsuniversity
dc.titleDetection and Mitigation of Pollution Attacks in Network Coding Enabled Small Cell Networks
dc.title.alternative
dc.creator.researcherKiran Kumar, Chanumolu
dc.subject.keyword5G
dc.subject.keywordNetwork Coding
dc.subject.keywordSmall Cells
dc.description.note
dc.contributor.guideNandha Kumar, R
dc.publisher.placeAmaravati
dc.publisher.universityVellore Institute of Technology (VIT-AP)
dc.publisher.institutionDepartment of Computer Science and Engineering
dc.date.registered2021
dc.date.completed2024
dc.date.awarded2024
dc.format.dimensions29x19
dc.format.accompanyingmaterialDVD
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
10_chapter-6.pdfAttached File897.34 kBAdobe PDFView/Open
11_chapter-7.pdf1.03 MBAdobe PDFView/Open
12_annexures.pdf118.61 kBAdobe PDFView/Open
1_title.pdf351.06 kBAdobe PDFView/Open
2_prelim pages.pdf109.03 kBAdobe PDFView/Open
3_content.pdf49.45 kBAdobe PDFView/Open
4_abstract.pdf63.09 kBAdobe PDFView/Open
5_chapter-1.pdf893.27 kBAdobe PDFView/Open
6_chapter-2.pdf142.95 kBAdobe PDFView/Open
7_chapter-3.pdf2.31 MBAdobe PDFView/Open
80_recommendation.pdf47.72 kBAdobe PDFView/Open
8_chapter-4.pdf830.12 kBAdobe PDFView/Open
9_chapter-5.pdf1.56 MBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: