Security requirements and challenges of 6G technologies and applications

SA Abdel Hakeem, HH Hussein, HW Kim - Sensors, 2022 - mdpi.com
After implementing 5G technology, academia and industry started researching 6th
generation wireless network technology (6G). 6G is expected to be implemented around the …

[HTML][HTML] Vision and research directions of 6G technologies and applications

SAA Hakeem, HH Hussein, HW Kim - Journal of King Saud University …, 2022 - Elsevier
Abstract Fifth-generation (5G) mobile communication technology is now widely available in
several countries, with millions of 5G customers. Therefore, it's time for academia and …

Towards 6G-enabled internet of vehicles: Security and privacy

DPM Osorio, I Ahmad, JDV Sánchez… - IEEE Open Journal …, 2022 - ieeexplore.ieee.org
The conceptualisation of the sixth generation of mobile wireless networks (6G) has already
started with some potential disruptive technologies resonating as enablers for driving the …

On the design of mutual authentication and key agreement protocol in internet of vehicles-enabled intelligent transportation system

P Bagga, AK Das, M Wazid… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Internet of Vehicles (IoV), a distributed network involving connected vehicles and Vehicular
Ad Hoc Networks (VANETs), allows connected vehicles to communicate with other Internet …

Session Key Agreement Protocol for Secure D2D Communication

VO Nyangaresi, Z Mohammad - … Conference on Safety and Security with …, 2022 - Springer
Device to device (D2D) communication offers numerous benefits such as low latencies, high
throughputs, spectral efficiency boosting, and base station energy reduction. However, lack …

Secure authentication and key management protocol for deployment of internet of vehicles (IoV) concerning intelligent transport systems

S Bojjagani, YCAP Reddy, T Anuradha… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Intelligent transport systems amalgamated with advanced technologies are an important
element of the automotive industry, including critical infrastructure and transportation …

Mfspv: A multi-factor secured and lightweight privacy-preserving authentication scheme for vanets

SA Alfadhli, S Lu, K Chen, M Sebai - IEEE Access, 2020 - ieeexplore.ieee.org
Vehicles authentication, the integrity of messages exchanged, and privacy-preserving are
essential features in vehicular ad hoc network (VANETs) security. Most of the previously …

A detailed relevance analysis of enabling technologies for 6G architectures

DGS Pivoto, TT Rezende, MSP Facina, R Moreira… - IEEE …, 2023 - ieeexplore.ieee.org
As society evolves as a whole, new demands arise with increasingly demanding
prerequisites, consequently requiring more significant effort to be met. Such demands cover …

Essential technics of cybersecurity for intelligent connected vehicles: Comprehensive review and perspective

Y Shichun, Z Zheng, M Bin, Z Yifan… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Along with the promotion of intelligent connected vehicles (ICVs), the problems of network
attacks have rapidly increased, and thus the cybersecurity has drawn much attention …

[HTML][HTML] Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security

SAA Hakeem, H Kim - Journal of King Saud University-Computer and …, 2023 - Elsevier
This paper presents a novel robust solution for key management, message encryption, and
authentication, offering enhanced security for 5G-V2X communication. By incorporating …