Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/588786
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2024-09-12T06:45:00Z | - |
dc.date.available | 2024-09-12T06:45:00Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/588786 | - |
dc.description.abstract | Strong network-based system operations are becoming more important due to the rising newlinereliance on network technology in everyday life and the rapid pace of technical newlineadvancement. The Comprehensive Error Rate Test Report states that the annual attack newlinecount nearly quadruples due to the increasing frequency of network attacks. A world newlineconnected with nearly zero latency will be available with fifth-generation (5G) mobile newlinecommunication. The demands of next-generation networking technology, which primarily newlineconcern efficiency and security, have given rise to Network Coding (NC) as a newlinepotential solution. For efficient data communication, a small cell environment with NC newlineis ideal. Intrusion Detection System (IDS) are a crucial defense against various types newlineof network intrusions. A unique IDS that is both lightweight and secure is thus required. newlineThe Homomorphic Message Authentication Code (HMAC) is quite popular as newlinean alternate. Tag pollution attacks allow hackers to elude detection by manipulating newlinethe end-of-packet tags, which can affect HMAC. Utilizing an HMAC-based approach newlinewith two distinct MAC tags helps thwart attacks on data and tag pollution. A major newlinesecurity risk that intrusions pose is that they take advantage of the weaknesses that NC newlinehas inherently. IDS s must be set up to detect intrusions if NC-enabled mobile small newlinecells are to reach their maximum potential. HMACs are commonly used in this field newlinebecause they offer safe NC techniques with less overheads than homomorphic signature newlineor hashing systems. Pollution attacks, in which intermediate nodes are utilized to newlinemanipulate packets in transit, pose considerable security dangers to NC-enabled mobile newlinesmall cells, despite the benefits they bring to 5G mobile networks. Therefore, in newlineorder for NC-enabled mobile small cells to achieve their full potential, IDS s that can newlineidentify pollution attacks are of the utmost importance. Thus, in this research, an Intrusion newlineSignalling System by using Adaptable Homomorphic MAC (ISS-AH-MAC) for newlineaccurate detection of intrusions in th | |
dc.format.extent | xiii,163 | |
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | Detection and Mitigation of Pollution Attacks in Network Coding Enabled Small Cell Networks | |
dc.title.alternative | ||
dc.creator.researcher | Kiran Kumar, Chanumolu | |
dc.subject.keyword | 5G | |
dc.subject.keyword | Network Coding | |
dc.subject.keyword | Small Cells | |
dc.description.note | ||
dc.contributor.guide | Nandha Kumar, R | |
dc.publisher.place | Amaravati | |
dc.publisher.university | Vellore Institute of Technology (VIT-AP) | |
dc.publisher.institution | Department of Computer Science and Engineering | |
dc.date.registered | 2021 | |
dc.date.completed | 2024 | |
dc.date.awarded | 2024 | |
dc.format.dimensions | 29x19 | |
dc.format.accompanyingmaterial | DVD | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
10_chapter-6.pdf | Attached File | 897.34 kB | Adobe PDF | View/Open |
11_chapter-7.pdf | 1.03 MB | Adobe PDF | View/Open | |
12_annexures.pdf | 118.61 kB | Adobe PDF | View/Open | |
1_title.pdf | 351.06 kB | Adobe PDF | View/Open | |
2_prelim pages.pdf | 109.03 kB | Adobe PDF | View/Open | |
3_content.pdf | 49.45 kB | Adobe PDF | View/Open | |
4_abstract.pdf | 63.09 kB | Adobe PDF | View/Open | |
5_chapter-1.pdf | 893.27 kB | Adobe PDF | View/Open | |
6_chapter-2.pdf | 142.95 kB | Adobe PDF | View/Open | |
7_chapter-3.pdf | 2.31 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 47.72 kB | Adobe PDF | View/Open | |
8_chapter-4.pdf | 830.12 kB | Adobe PDF | View/Open | |
9_chapter-5.pdf | 1.56 MB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: