Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

Efficient and secure service-oriented authentication supporting network slicing for 5G-enabled IoT

J Ni, X Lin, XS Shen - IEEE Journal on Selected Areas in …, 2018 - ieeexplore.ieee.org
5G network is considered as a key enabler in meeting continuously increasing demands for
the future Internet of Things (IoT) services, including high data rate, numerous devices …

Security and privacy for healthcare blockchains

R Zhang, R Xue, L Liu - IEEE Transactions on Services …, 2021 - ieeexplore.ieee.org
Healthcare blockchains provide an innovative way to store healthcare information, execute
healthcare transactions, and build trust for healthcare data sharing and data integration in a …

Robust and universal seamless handover authentication in 5G HetNets

Y Zhang, RH Deng, E Bertino… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The evolving fifth generation (5G) cellular networks will be a collection of heterogeneous
and backward-compatible networks. With the increased heterogeneity and densification of …

[PDF][PDF] OCTOPUS: An edge-fog mutual authentication scheme.

MH Ibrahim - Int. J. Netw. Secur., 2016 - academia.edu
Authentication is an important and challenging issue for the security of Fog computing since,
services are offered to massive-scale end users (Fog users or Edge) by front Fog servers (or …

Secure and efficient handover authentication based on bilinear pairing functions

D He, C Chen, S Chan, J Bu - IEEE Transactions on Wireless …, 2011 - ieeexplore.ieee.org
Seamless handover over multiple access points is highly desirable to mobile nodes, but
ensuring security and efficiency of this process is challenging. This paper shows that prior …

A distributed authentication scheme based on smart contract for roaming service in mobile vehicular networks

K Xue, X Luo, Y Ma, J Li, J Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Secure and real-time communication is an essential condition in mobile vehicular networks,
and this requires secure authentication and seamless access enabled by roaming services …

FogHA: An efficient handover authentication for mobile devices in fog computing

Y Guo, Y Guo - Computers & Security, 2021 - Elsevier
Fog computing is a new distributed computing paradigm that extends cloud services to the
edge of the network, with features such as mobile support, location awareness, and low …

AnFRA: Anonymous and fast roaming authentication for space information network

Q Yang, K Xue, J Xu, J Wang, F Li… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Nowadays, the Space Information Network (SIN) has been widely used in real life because
of its advantages of communicating anywhere at any time. This feature is leading to a new …

Is 5G handover secure and private? A survey

D Zhao, Z Yan, M Wang, P Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The next-generation mobile cellular communication and networking system (5G) is highly
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …