Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

Security and privacy in location-based services for vehicular and mobile communications: An overview, challenges, and countermeasures

P Asuquo, H Cruickshank, J Morley… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
Location-based services (LBSs) have gained popularity as a result of the advances in
mobile and communication technologies. LBS provide users with relevant information based …

Robust and universal seamless handover authentication in 5G HetNets

Y Zhang, RH Deng, E Bertino… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The evolving fifth generation (5G) cellular networks will be a collection of heterogeneous
and backward-compatible networks. With the increased heterogeneity and densification of …

Sdn-based vanets, security attacks, applications, and challenges

M Arif, G Wang, O Geman, VE Balas, P Tao… - Applied Sciences, 2020 - mdpi.com
Vehicular ad-hoc networks (VANETs) are the specific sort of ad-hoc networks that are
utilized in intelligent transportation systems (ITS). VANETs have become one of the most …

A survey on software-defined VANETs: benefits, challenges, and future directions

WB Jaballah, M Conti, C Lal - arxiv preprint arxiv:1904.04577, 2019 - arxiv.org
The evolving of Fifth Generation (5G) networks isbecoming more readily available as a
major driver of the growthof new applications and business models. Vehicular Ad …

Security and design requirements for software-defined VANETs

WB Jaballah, M Conti, C Lal - Computer Networks, 2020 - Elsevier
Abstract The evolving of Fifth Generation (5G) networks is becoming more readily available
as a significant driver of the growth of new applications and business models. Vehicular Ad …

Is 5G handover secure and private? A survey

D Zhao, Z Yan, M Wang, P Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The next-generation mobile cellular communication and networking system (5G) is highly
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …

A simple and robust handover authentication between HeNB and eNB in LTE networks

J Cao, H Li, M Ma, Y Zhang, C Lai - Computer Networks, 2012 - Elsevier
There are two types of base stations in the Long Term Evolution (LTE) wireless networks,
Home eNodeB (HeNB) and eNodeB (eNB). To achieve seamless handovers between the …

A handover authentication using credentials based on chameleon hashing

J Choi, S Jung - IEEE communications letters, 2009 - ieeexplore.ieee.org
This letter proposes a handover authentication scheme using credentials based on
chameleon hashing. The main challenges in handover authentication are to provide robust …

An efficient certificateless anonymous signcryption communication scheme for vehicular adhoc network

C Luo, D Li, MS Khan - Scientific Reports, 2024 - nature.com
Certificateless public key infrastructure (PKI) avoids the key escrow problem associated with
identity-based PKI and has recently been widely employed in anonymous communication …