Security requirements and challenges of 6G technologies and applications
After implementing 5G technology, academia and industry started researching 6th
generation wireless network technology (6G). 6G is expected to be implemented around the …
generation wireless network technology (6G). 6G is expected to be implemented around the …
[HTML][HTML] Vision and research directions of 6G technologies and applications
Abstract Fifth-generation (5G) mobile communication technology is now widely available in
several countries, with millions of 5G customers. Therefore, it's time for academia and …
several countries, with millions of 5G customers. Therefore, it's time for academia and …
Towards 6G-enabled internet of vehicles: Security and privacy
The conceptualisation of the sixth generation of mobile wireless networks (6G) has already
started with some potential disruptive technologies resonating as enablers for driving the …
started with some potential disruptive technologies resonating as enablers for driving the …
On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system
Internet of Vehicles (IoV), a distributed network involving connected vehicles and Vehicular
Ad Hoc Networks (VANETs), allows connected vehicles to communicate with other Internet …
Ad Hoc Networks (VANETs), allows connected vehicles to communicate with other Internet …
Session Key Agreement Protocol for Secure D2D Communication
Device to device (D2D) communication offers numerous benefits such as low latencies, high
throughputs, spectral efficiency boosting, and base station energy reduction. However, lack …
throughputs, spectral efficiency boosting, and base station energy reduction. However, lack …
Secure authentication and key management protocol for deployment of internet of vehicles (IoV) concerning intelligent transport systems
Intelligent transport systems amalgamated with advanced technologies are an important
element of the automotive industry, including critical infrastructure and transportation …
element of the automotive industry, including critical infrastructure and transportation …
Mfspv: A multi-factor secured and lightweight privacy-preserving authentication scheme for vanets
Vehicles authentication, the integrity of messages exchanged, and privacy-preserving are
essential features in vehicular ad hoc network (VANETs) security. Most of the previously …
essential features in vehicular ad hoc network (VANETs) security. Most of the previously …
A detailed relevance analysis of enabling technologies for 6G architectures
As society evolves as a whole, new demands arise with increasingly demanding
prerequisites, consequently requiring more significant effort to be met. Such demands cover …
prerequisites, consequently requiring more significant effort to be met. Such demands cover …
Essential technics of cybersecurity for intelligent connected vehicles: Comprehensive review and perspective
Y Shichun, Z Zheng, M Bin, Z Yifan… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Along with the promotion of intelligent connected vehicles (ICVs), the problems of network
attacks have rapidly increased, and thus the cybersecurity has drawn much attention …
attacks have rapidly increased, and thus the cybersecurity has drawn much attention …
[HTML][HTML] Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security
This paper presents a novel robust solution for key management, message encryption, and
authentication, offering enhanced security for 5G-V2X communication. By incorporating …
authentication, offering enhanced security for 5G-V2X communication. By incorporating …