Secure Network Coding for SDN-Based Mobile Small Cells

  • Vipindev Adat
  • Ilias PolitisEmail author
  • Christos Tselios
  • Stavros Kotsopoulos
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 263)


The future wireless networks including the fifth generation of mobile networks have to serve a very dense heterogeneous network of devices with high resiliency and reliability. Network coding is also emerging as a potential key enabler for optimizing bandwidth requirements and energy consumption in highly dense mobile network environments. However, network coding deployments still need to consider security vulnerabilities and their countermeasures, before they can be adapted as part of the emerging mobile network deployments. On the other hand the software defined networking can be employed in the mobile small cell environment to achieve highly efficient and easily configurable network architecture. This paper studies the scope of utilizing the SDN based mobile small cells to implement secure network coded mobile small cells minimizing the overheads and delays.


Random linear network coding Pollution attacks 5G small cells 


  1. 1.
    Tselios, C., Tsolis, G.: On QoE-awareness through virtualized probes in 5G networks. In: 2016 IEEE 21st International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD), pp. 159–164, October 2016Google Scholar
  2. 2.
    Tselios, C., Politis, I., Tsagkaropoulos, M., Dagiuklas, T.: Valuing quality of experience: a brave new era of user satisfaction and revenue possibilities. In: 2011 50th FITCE Congress - “ICT: Bridging an Ever Shifting Digital Divide”, pp. 1–6, August 2011Google Scholar
  3. 3.
    Tselios, C., Tsolis, G.: A survey on software tools and architectures for deploying multimedia-aware cloud applications. In: Karydis, I., Sioutas, S., Triantafillou, P., Tsoumakos, D. (eds.) ALGOCLOUD 2015. LNCS, vol. 9511, pp. 168–180. Springer, Cham (2016). Scholar
  4. 4.
    Tselios, C., Politis, I., Kotsopoulos, S.: Enhancing SDN security for IoT-related deployments through blockchain. In: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 303–308, November 2017Google Scholar
  5. 5.
    Rodriguez, J., et al.: SECRET - secure network coding for reduced energy next generation mobile small cells: a European Training Network in wireless communications and networking for 5G. In: 2017 Internet Technologies and Applications (ITA), pp. 329–333, September 2017Google Scholar
  6. 6.
    Cai, N., Yeung, R.W.: Secure network coding. In: Proceedings IEEE International Symposium on Information Theory, p. 323 (2002)Google Scholar
  7. 7.
    Dong, J., Curtmola, R., Nita-Rotaru, C.: Practical defenses against pollution attacks in wireless network coding. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 7 (2011)CrossRefGoogle Scholar
  8. 8.
    Dong, J., Curtmola, R., Nita-Rotaru, C., Yau, D.K.Y.: Pollution attacks and defenses in wireless interflow network coding systems. IEEE Trans. Dependable Secur. Comput. 9(5), 741–755 (2012)CrossRefGoogle Scholar
  9. 9.
    Jaggi, S., et al.: Resilient network coding in the presence of byzantine adversaries. IEEE Trans. Inf. Theory 54(6), 2596–2603 (2008)MathSciNetCrossRefGoogle Scholar
  10. 10.
    Ho, T., et al.: A random linear network coding approach to multicast. IEEE Trans. Inf. Theory 52(10), 4413–4430 (2006)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292–305. Springer, Heidelberg (2009). Scholar
  12. 12.
    Zhang, P., Jiang, Y., Lin, C., Yao, H., Wasef, A., Shenz, X.: Padding for orthogonality: efficient subspace authentication for network coding. In: 2011 Proceedings IEEE INFOCOM, pp. 1026–1034, April 2011Google Scholar
  13. 13.
    Esfahani, A., Mantas, G., Rodriguez, J., Neves, J.C.: An efficient homomorphic mac-based scheme against data and tag pollution attacks in network coding-enabled wireless networks. Int. J. Inf. Secur. 16(6), 627–639 (2017)CrossRefGoogle Scholar
  14. 14.
    Esfahani, A., Yang, D., Mantas, G., Nascimento, A., Rodriguez, J.: Dual-homomorphic message authentication code scheme for network coding-enabled wireless sensor networks. Int. J. Distrib. Sens. Netw. 11(7), 510251 (2015)CrossRefGoogle Scholar
  15. 15.
    Bolivar, L.T., Tselios, C., Area, D.M., Tsolis, G.: On the deployment of an open-source, 5G-aware evaluation testbed. In: 2018 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 51–58, March 2018Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • Vipindev Adat
    • 1
  • Ilias Politis
    • 1
    Email author
  • Christos Tselios
    • 1
  • Stavros Kotsopoulos
    • 1
  1. 1.Wireless Telecommunications LaboratoryUniversity of PatrasPatrasGreece

Personalised recommendations