Abstract

With technological breakthroughs and increasing network technology reliability in daily life, it is vital to provide robust network-based system operations. According to the Comprehensive Error Rate Test Report, as network attacks become more common, the number of attacks nearly doubles or triples every year. The fifth-generation mobile communication is going to provide a connecting world with almost zero Latency. Network coding has emerged as a viable answer to the mostly efficiency, secure network needs for coming-generation networking technology. A small cell environment with network coding allows an effective system to communicate with the high rate of data. A significant countermeasure for several forms of network attacks is the Intrusion Detection Systems (IDS). Unique IDS solutions which are lightweight but also provide a high level of security are therefore demanded. The main security concerns in collaborative networks are Distributed -Denial- of- Service (DDOS) attacks, pollution attacks etc. While the network efficiency of non-DDOS attacks is also impaired, the impact of DDOS attacks is severe. In DDOS attacks, the specific node as a victim floods and mass traffic jams occurs, affecting the entire network performance. However, small, NC-enabled mobile cells, due to the essential NC vulnerabilities, are susceptible to pollution attacks. This article presents a brief survey on intrusion detection and mitigation schemes for Network Coding environment Mobile Small Cells.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.