Visible to the public Malicious user identification scheme for network coding enabled small cell environment

TitleMalicious user identification scheme for network coding enabled small cell environment
Publication TypeConference Paper
Year of Publication2020
AuthorsAdat, V., Parsamehr, R., Politis, I., Tselios, C., Kotsopoulos, S.
Conference NameICC 2020 - 2020 IEEE International Conference on Communications (ICC)
Keywords5G, 5G mobile communication, cellular radio, Communication networks, composability, Computer architecture, cooperative communication, dense network coding, device to device communication, fifth generation of communication networks, malicious user identification scheme, Metrics, Microprocessors, network coding, network coding environment, next generation communication technologies, next generation networks, Peer-to-peer computing, Pollution, Protocols, pubcrawl, reliable communication, resilience, Resiliency, security, small cell technology, Small Cells, telecommunication network reliability, telecommunication security, Throughput, wireless network
AbstractReliable communication over the wireless network with high throughput is a major target for the next generation communication technologies. Network coding can significantly improve the throughput efficiency of the network in a cooperative environment. The small cell technology and device to device communication make network coding an ideal candidate for improved performance in the fifth generation of communication networks. However, the security concerns associated with network coding needs to be addressed before any practical implementations. Pollution attacks are considered one of the most threatening attacks in the network coding environment. Although there are different integrity schemes to detect polluted packets, identifying the exact adversary in a network coding environment is a less addressed challenge. This paper proposes a scheme for identifying and locating adversaries in a dense, network coding enabled environment of mobile nodes. It also discusses a non-repudiation protocol that will prevent adversaries from deceiving the network.
DOI10.1109/ICC40277.2020.9148736
Citation Keyadat_malicious_2020