Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

MA Ferrag, L Maglaras, A Argyriou, D Kosmanos… - Journal of Network and …, 2018 - Elsevier
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …

Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks

K Gai, Y Wu, L Zhu, L Xu… - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
The blooming trend of smart grid deployment is engaged by the evolution of the network
technology, as the connected environment offers various alternatives for electrical data …

Blockchain-based dynamic key management for heterogeneous intelligent transportation systems

A Lei, H Cruickshank, Y Cao, P Asuquo… - IEEE Internet of …, 2017 - ieeexplore.ieee.org
As modern vehicle and communication technologies advanced apace, people begin to
believe that the Intelligent Transportation System (ITS) would be achievable in one decade …

5G roadmap: 10 key enabling technologies

IF Akyildiz, S Nie, SC Lin, M Chandrasekaran - Computer Networks, 2016 - Elsevier
The fifth generation (5G) mobile communication networks will require a major paradigm shift
to satisfy the increasing demand for higher data rates, lower network latencies, better energy …

Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment

D Wang, D He, P Wang, CH Chu - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …

Physical-layer authentication for wireless security enhancement: Current challenges and future developments

X Wang, P Hao, L Hanzo - IEEE Communications Magazine, 2016 - ieeexplore.ieee.org
While the open nature of radio propagation enables convenient “anywhere” wireless access,
it becomes the root of security vulnerabilities in wireless communications. In light of this …

A secure authentication scheme for VANETs with batch verification

M Bayat, M Barmshoory, M Rahimi, MR Aref - Wireless networks, 2015 - Springer
Abstract Vehicular Ad-hoc Networks (VANETs) will start becoming deployed within the next
decade. Among other benefits, it is expected that VANETs will support applications and …

Authentication handover and privacy protection in 5G hetnets using software-defined networking

X Duan, X Wang - IEEE Communications Magazine, 2015 - ieeexplore.ieee.org
Recently, densified small cell deployment with overlay coverage through coexisting
heterogeneous networks has emerged as a viable solution for 5G mobile networks …

LBSV: Lightweight blockchain security protocol for secure storage and communication in SDN-enabled IoV

L Vishwakarma, A Nahar, D Das - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The development of modern software-defined networking (SDN) solutions brings new
opportunities in Internet-of-Vehicles (IoVs). However, the autonomous nature of the …

Robust and universal seamless handover authentication in 5G HetNets

Y Zhang, RH Deng, E Bertino… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The evolving fifth generation (5G) cellular networks will be a collection of heterogeneous
and backward-compatible networks. With the increased heterogeneity and densification of …