Key management for beyond 5G mobile small cells: A survey

M De Ree, G Mantas, A Radwan, S Mumtaz… - IEEE …, 2019 - ieeexplore.ieee.org
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …

On security against pollution attacks in network coding enabled 5g networks

VA Vasudevan, C Tselios, I Politis - IEEE Access, 2020 - ieeexplore.ieee.org
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …

On blockchain enhanced secure network coding for 5G deployments

V Adat, I Politis, C Tselios, P Galiotos… - 2018 IEEE global …, 2018 - ieeexplore.ieee.org
The fifth generation of mobile networks is rapidly evolving, fueled by the ever-growing
mobile traffic over recent years. Ultra-reliable and low latency provisioning of services with …

An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks

A Esfahani, G Mantas, J Rodriguez… - International Journal of …, 2017 - Springer
Recent research efforts have shown that wireless networks can benefit from network coding
(NC) technology in terms of bandwidth, robustness to packet losses, delay and energy …

A novel intrusion detection and prevention scheme for network coding-enabled mobile small cells

R Parsamehr, A Esfahani, G Mantas… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Network coding (NC)-enabled mobile small cells are observed as a promising technology
for fifth-generation (5G) networks that can cover the urban landscape by being set up on …

IDLP: An efficient intrusion detection and location-aware prevention mechanism for network coding-enabled mobile small cells

R Parsamehr, G Mantas, J Rodriguez… - IEEE …, 2020 - ieeexplore.ieee.org
Mobile small cell technology is considered as a 5G enabling technology for delivering
ubiquitous 5G services in a cost-effective and energy efficient manner. Moreover, Network …

An efficient null space-based homomorphic MAC scheme against tag pollution attacks in RLNC

A Esfahani, G Mantas… - IEEE Communications …, 2016 - ieeexplore.ieee.org
This letter proposes an efficient null space-based homomorphic message authentication
code scheme providing resistance against tag pollution attacks in random linear network …

A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT

B Wu, C Wang, H Yao - Peer-to-Peer Networking and Applications, 2021 - Springer
Network coding is an effective method to optimize network throughput and improve routing
reliability, and has been widely used in a decentralized Internet of Things system. However …

General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding

J Chang, Y Ji, M Xu, R Xue - Future Generation Computer Systems, 2019 - Elsevier
Homomorphic (broadcast) message authentication code (MAC for short) scheme is a
powerful tool for network coding to resist the pollution attack. However, many existing …

An efficient privacy-preserving scheme for secure network coding based on compressed sensing

D Xie, H Peng, L Li, Y Yang - AEU-International Journal of Electronics and …, 2017 - Elsevier
Network coding (NC) provides an elegant solution for improving capacity and robustness in
computer networks. Different to traditional “store-and-forward” transmission paradigm, each …