Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks
The blooming trend of smart grid deployment is engaged by the evolution of the network
technology, as the connected environment offers various alternatives for electrical data …
technology, as the connected environment offers various alternatives for electrical data …
Blockchain-based dynamic key management for heterogeneous intelligent transportation systems
As modern vehicle and communication technologies advanced apace, people begin to
believe that the Intelligent Transportation System (ITS) would be achievable in one decade …
believe that the Intelligent Transportation System (ITS) would be achievable in one decade …
5G roadmap: 10 key enabling technologies
The fifth generation (5G) mobile communication networks will require a major paradigm shift
to satisfy the increasing demand for higher data rates, lower network latencies, better energy …
to satisfy the increasing demand for higher data rates, lower network latencies, better energy …
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
Despite two decades of intensive research, it remains a challenge to design a practical
anonymous two-factor authentication scheme, for the designers are confronted with an …
anonymous two-factor authentication scheme, for the designers are confronted with an …
Physical-layer authentication for wireless security enhancement: Current challenges and future developments
While the open nature of radio propagation enables convenient “anywhere” wireless access,
it becomes the root of security vulnerabilities in wireless communications. In light of this …
it becomes the root of security vulnerabilities in wireless communications. In light of this …
A secure authentication scheme for VANETs with batch verification
Abstract Vehicular Ad-hoc Networks (VANETs) will start becoming deployed within the next
decade. Among other benefits, it is expected that VANETs will support applications and …
decade. Among other benefits, it is expected that VANETs will support applications and …
Authentication handover and privacy protection in 5G hetnets using software-defined networking
X Duan, X Wang - IEEE Communications Magazine, 2015 - ieeexplore.ieee.org
Recently, densified small cell deployment with overlay coverage through coexisting
heterogeneous networks has emerged as a viable solution for 5G mobile networks …
heterogeneous networks has emerged as a viable solution for 5G mobile networks …
LBSV: Lightweight blockchain security protocol for secure storage and communication in SDN-enabled IoV
The development of modern software-defined networking (SDN) solutions brings new
opportunities in Internet-of-Vehicles (IoVs). However, the autonomous nature of the …
opportunities in Internet-of-Vehicles (IoVs). However, the autonomous nature of the …
Robust and universal seamless handover authentication in 5G HetNets
The evolving fifth generation (5G) cellular networks will be a collection of heterogeneous
and backward-compatible networks. With the increased heterogeneity and densification of …
and backward-compatible networks. With the increased heterogeneity and densification of …