Skip to main content

Security Threats in Network Coding-Enabled Mobile Small Cells

  • Conference paper
  • First Online:
Broadband Communications, Networks, and Systems (BROADNETS 2018)

Abstract

The recent explosive growth of mobile data traffic, the continuously growing demand for higher data rates, and the steadily increasing pressure for higher mobility have led to the fifth-generation mobile networks. To this end, network-coding (NC)-enabled mobile small cells are considered as a promising 5G technology to cover the urban landscape by being set up on-demand at any place, and at any time on any device. In particular, this emerging paradigm has the potential to provide significant benefits to mobile networks as it can decrease packet transmission in wireless multicast, provide network capacity improvement, and achieve robustness to packet losses with low energy consumption. However, despite these significant advantages, NC-enabled mobile small cells are vulnerable to various types of attacks due to the inherent vulnerabilities of NC. Therefore, in this paper, we provide a categorization of potential security attacks in NC-enabled mobile small cells. Particularly, our focus is on the identification and categorization of the main potential security attacks on a scenario architecture of the ongoing EU funded H2020-MSCA project “SECRET” being focused on secure network coding-enabled mobile small cells.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wang, C.-X., et al.: Cellular architecture and key technologies for 5G wireless communication networks. IEEE Commun. Mag. 52(2), 122–130 (2014)

    Article  Google Scholar 

  2. Chih-Lin, I., et al.: Toward green and soft: a 5G perspective. IEEE Commun. Mag. 52(2), 66–73 (2014)

    Article  Google Scholar 

  3. Bangerter, B., et al.: Networks and devices for the 5G era. IEEE Commun. Mag. 52(2), 90–96 (2014)

    Article  Google Scholar 

  4. Sucasas, V., Mantas, G., Rodriguez, J.: Security challenges for cloud radio access networks. In: Backhauling/Fronthauling for Future Wireless Systems, pp. 195–211 (2016)

    Chapter  Google Scholar 

  5. Mantas, G., et al.: Security for 5G Communications (2015)

    Google Scholar 

  6. Gupta, A., Jha, R.K.: A survey of 5G network: architecture and emerging technologies. IEEE Access 3, 1206–1232 (2015)

    Article  Google Scholar 

  7. Chou, S.-F., et al.: Mobile small cell deployment for next generation cellular networks. In: Global Communications Conference (GLOBECOM), 2014 IEEE. IEEE (2014)

    Google Scholar 

  8. Saghezchi, F.B., et al.: Drivers for 5G. Fundamentals of 5G Mobile Networks, pp. 1–27 (2015)

    Google Scholar 

  9. Katti, S., et al.: XORs in the air: practical wireless network coding. In: ACM SIGCOMM Computer Communication Review. ACM (2006)

    Google Scholar 

  10. Chen, Y.-J., et al.: Topology-aware network coding for wireless multicast. IEEE Syst. J. 12(4), 3683–3692 (2018)

    Article  Google Scholar 

  11. Ahlswede, R., et al.: Network information flow. IEEE Trans. Inf. Theor. 46(4), 1204–1216 (2000)

    Article  MathSciNet  Google Scholar 

  12. Ho, T., Lun, D.: Network Coding: An Introduction. Cambridge University Press, New York (2008)

    Book  Google Scholar 

  13. Wu, Y., Chou, P.A., Kung, S.-Y.: Minimum-energy multicast in mobile ad hoc networks using network coding. IEEE Trans. Commun. 53(11), 1906–1918 (2005)

    Article  Google Scholar 

  14. Esfahani, A., et al.: Towards secure network coding-enabled wireless sensor networks in cyber-physical systems. In: Cyber-Physical Systems from Theory to Practice, ch. 16, pp. 395–415 (2015)

    Chapter  Google Scholar 

  15. Esfahani, A., et al.: A null space-based MAC scheme against pollution attacks to Random linear Network Coding. In: 2015 IEEE International Conference on Communication Workshop (ICCW). IEEE (2015)

    Google Scholar 

  16. Esfahani, A., et al.: An improved homomorphic message authentication code scheme for RLNC-enabled wireless networks. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE (2014)

    Google Scholar 

  17. Esfahani, A., et al.: Analysis of a homomorphic MAC-based scheme against tag pollution in RLNC-enabled wireless networks. In: 2015 IEEE 20th International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD). IEEE (2015)

    Google Scholar 

  18. Yang, D., et al.: Jointly padding for subspace orthogonality against tag pollution. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE (2014)

    Google Scholar 

  19. Esfahani, A., et al.: Dual-homomorphic message authentication code scheme for network coding-enabled wireless sensor networks. Int. J. Distrib. Sens. Netw. 11(7), 510251 (2015)

    Article  Google Scholar 

  20. Esfahani, A., et al.: An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks. Int. J. Inf. Secur. 16(6), 627–639 (2017)

    Article  MathSciNet  Google Scholar 

  21. Esfahani, A., Mantas, G., Rodriguez, J.: An efficient null space-based homomorphic MAC scheme against tag pollution attacks in RLNC. IEEE Commun. Lett. 20(5), 918–921 (2016)

    Article  Google Scholar 

  22. Esfahani, A., et al.: An efficient MAC-based scheme against pollution attacks in XOR network coding-enabled WBANs for remote patient monitoring systems. EURASIP J. Wirel. Commun. Netw. 2016(1), 113 (2016)

    Article  Google Scholar 

  23. SEcure Network Coding for Reduced Energy nexT generation Mobile Small cells. H2020-MSCA-ITN-2016-722424 01 January 2017–31 December 2020. http://h2020-secret.eu/index.html

  24. Talooki, V.N., et al.: Security concerns and countermeasures in network coding based communication systems: a survey. Comput. Netw. 83, 422–445 (2015)

    Article  Google Scholar 

  25. Ostovari, P., Wu, J.: Towards Network Coding for Cyber-Physical Systems: Security Challenges and Applications. Wiley (2017)

    Google Scholar 

  26. Lima, L., et al.: Network coding security: Attacks and countermeasures. arXiv preprint arXiv:0809.1366 (2008)

  27. Fan, Y., et al.: An efficient privacy-preserving scheme against traffic analysis attacks in network coding. In: INFOCOM 2009 IEEE. IEEE (2009)

    Google Scholar 

  28. Wu, B., Chen, J., Wu, J., Cardei, M.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Xiao, Y., Shen, X.S., Du, D.Z. (eds.) Wireless Network Security. Signals and Communication Technology. Springer, Boston (2007). https://doi.org/10.1007/978-0-387-33112-6_5

    Chapter  Google Scholar 

  29. Jawandhiya, P.M., et al.: A survey of mobile ad hoc network attacks. Int. J. Eng. Sci. Technol. 2(9), 4063–4071 (2010)

    Google Scholar 

  30. Dong, J., et al.: Pollution attacks and defenses in wireless interflow network coding systems. IEEE Trans. Depend. Secure Comput. 9(5), 741–755 (2012)

    Article  Google Scholar 

  31. Newell, A.J., Curtmola, R., Nita-Rotaru, C.: Entropy attacks and countermeasures in wireless network coding. In: Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM (2012)

    Google Scholar 

  32. Chen, B., et al.: Remote data checking for network coding-based distributed storage systems. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop. ACM (2010)

    Google Scholar 

  33. Chiu, H.S., Lui, K.-S.: DelPHI: wormhole detection mechanism for ad hoc wireless networks. In: 2006 1st International Symposium on Wireless Pervasive Computing. IEEE (2006)

    Google Scholar 

  34. Mishra, A., Nadkarni, K.M.: Security in wireless ad hoc networks. In: The Handbook of Ad Hoc Wireless Networks. CRC Press, Inc (2003)

    Google Scholar 

  35. Padmavathi, D.G., Shanmugapriya, M.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576 (2009)

Download references

Acknowledgments

This research work leading to this publication has received funding from the European Union’s Horizon 2020 Research and Innovation programme under grant agreement H2020-MSCA-ITN-2016-SECRET-722424.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Reza Parsamehr .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Parsamehr, R., Mantas, G., Radwan, A., Rodriguez, J., Martínez, JF. (2019). Security Threats in Network Coding-Enabled Mobile Small Cells. In: Sucasas, V., Mantas, G., Althunibat, S. (eds) Broadband Communications, Networks, and Systems. BROADNETS 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 263. Springer, Cham. https://doi.org/10.1007/978-3-030-05195-2_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05195-2_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05194-5

  • Online ISBN: 978-3-030-05195-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics