Security control and data planes of SDN: a comprehensive review of traditional, AI and MTD approaches to security solutions

AH Abdi, L Audah, A Salh, MA Alhartomi… - IEEE …, 2024 - ieeexplore.ieee.org
Software-Defined Networking (SDN) is a groundbreaking technology that has transformed
network management significantly. By integrating data and control, SDN offers unparalleled …

Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review

ZT Pritee, MH Anik, SB Alam, JR Jim, MM Kabir… - Computers & …, 2024 - Elsevier
In the continuously develo** field of cyber security, user authentication and authorization
play a vital role in protecting personal information and digital assets from unauthorized use …

[HTML][HTML] Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication

AM Mostafa, M Ezz, MK Elbashir, M Alruily… - Applied Sciences, 2023 - mdpi.com
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud
security from unauthorized access and data breaches. Multi-factor authentication verifies …

Securing digital identity in the zero trust architecture: A blockchain approach to privacy-focused multi-factor authentication

JJD Rivera, A Muhammad… - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
As network systems advance and become more sophisticated, the associated security
challenges grow more complex. The zero trust model emerges as a new paradigm to …

Fhap: Fast handover authentication protocol for high-speed mobile terminals in 5g satellite–terrestrial-integrated networks

Y Yang, J Cao, R Ma, L Cheng, L Chen… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The integration of satellite and terrestrial networks presents new opportunities and
challenges for high speed rail (HSR) communications. Since the HSR runs vary fast, user …

A privacy preserving four-factor authentication protocol for internet of medical things

P Guo, W Liang, S Xu - Computers & Security, 2024 - Elsevier
Medical applications of the Internet of Things (IoT) have gained significant attention,
especially in the context of monitoring health-related information for elderly individuals living …

User security authentication protocol in multi gateway scenarios of the Internet of Things

J Zhao, F Huang, H Hu, L Liao, D Wang, L Fan - Ad Hoc Networks, 2024 - Elsevier
Abstract 5G technology has been applied and popularized, leading to the widespread usage
of the Internet of Things (IoT) in various areas such as intelligent transportation, home …

Sustainable authentication and key agreement protocol using chaotic maps for industry 5.0

T Zhang, J Shen, H Yang, P Vijayakumar… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
With the rapid development and maturity of human-machine interaction and industrial
Internet technology, the concept of a human-machine collaborative industrial model has …

READ: Resource efficient authentication scheme for digital twin edge networks

K Wang, J Dong, Y Xu, X Ji, L Sha, F **ao - Future Generation Computer …, 2025 - Elsevier
In recent vigorous developments, digital twin edge networks (DITEN) have emerged as a
network paradigm to improve network communication efficiency. Given that Web 3.0 …

Efficient crypto engine for authenticated encryption, data traceability, and replay attack detection over CAN bus network

A Rasheed, M Baza, MM Badr… - … on Network Science …, 2023 - ieeexplore.ieee.org
Smart vehicles and industrial control systems becoming increasingly complex. They are
comprised of a large number of connected intelligence sensor devices. For such systems …