Authentication protocols for internet of things: a comprehensive survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …
is presented. Specifically more than forty authentication protocols developed for or applied …
Security and privacy in location-based services for vehicular and mobile communications: An overview, challenges, and countermeasures
Location-based services (LBSs) have gained popularity as a result of the advances in
mobile and communication technologies. LBS provide users with relevant information based …
mobile and communication technologies. LBS provide users with relevant information based …
Robust and universal seamless handover authentication in 5G HetNets
The evolving fifth generation (5G) cellular networks will be a collection of heterogeneous
and backward-compatible networks. With the increased heterogeneity and densification of …
and backward-compatible networks. With the increased heterogeneity and densification of …
Sdn-based vanets, security attacks, applications, and challenges
Vehicular ad-hoc networks (VANETs) are the specific sort of ad-hoc networks that are
utilized in intelligent transportation systems (ITS). VANETs have become one of the most …
utilized in intelligent transportation systems (ITS). VANETs have become one of the most …
A survey on software-defined VANETs: benefits, challenges, and future directions
The evolving of Fifth Generation (5G) networks isbecoming more readily available as a
major driver of the growthof new applications and business models. Vehicular Ad …
major driver of the growthof new applications and business models. Vehicular Ad …
Security and design requirements for software-defined VANETs
Abstract The evolving of Fifth Generation (5G) networks is becoming more readily available
as a significant driver of the growth of new applications and business models. Vehicular Ad …
as a significant driver of the growth of new applications and business models. Vehicular Ad …
Is 5G handover secure and private? A survey
The next-generation mobile cellular communication and networking system (5G) is highly
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …
A simple and robust handover authentication between HeNB and eNB in LTE networks
There are two types of base stations in the Long Term Evolution (LTE) wireless networks,
Home eNodeB (HeNB) and eNodeB (eNB). To achieve seamless handovers between the …
Home eNodeB (HeNB) and eNodeB (eNB). To achieve seamless handovers between the …
A handover authentication using credentials based on chameleon hashing
J Choi, S Jung - IEEE communications letters, 2009 - ieeexplore.ieee.org
This letter proposes a handover authentication scheme using credentials based on
chameleon hashing. The main challenges in handover authentication are to provide robust …
chameleon hashing. The main challenges in handover authentication are to provide robust …
An efficient certificateless anonymous signcryption communication scheme for vehicular adhoc network
C Luo, D Li, MS Khan - Scientific Reports, 2024 - nature.com
Certificateless public key infrastructure (PKI) avoids the key escrow problem associated with
identity-based PKI and has recently been widely employed in anonymous communication …
identity-based PKI and has recently been widely employed in anonymous communication …