Machine type communications: key drivers and enablers towards the 6G era
The recently introduced 5G New Radio is the first wireless standard natively designed to
support critical and massive machine type communications (MTC). However, it is already …
support critical and massive machine type communications (MTC). However, it is already …
Blockchain‐Envisioned Secure Authentication Approach in AIoT: Applications, Challenges, and Future Research
The Artificial Intelligence of Things (AIoT) is the amalgamation of Artificial Intelligence (AI)
methods and the Internet of Things (IoT) infrastructure, which are deployed there to improve …
methods and the Internet of Things (IoT) infrastructure, which are deployed there to improve …
[HTML][HTML] A scalable and lightweight group authentication framework for Internet of Medical Things using integrated blockchain and fog computing
Abstract The Internet of Medical Things (IoMT) is the network of medical devices, software
applications, and healthcare information systems used for remote monitoring and delivery of …
applications, and healthcare information systems used for remote monitoring and delivery of …
GASE: A lightweight group authentication scheme with key agreement for edge computing applications
Motivated by the fact that mass authentication is one of the desirable security features in the
edge computing paradigm, we propose a lightweight group authentication protocol with a …
edge computing paradigm, we propose a lightweight group authentication protocol with a …
A lightweight anonymous authentication protocol for resource-constrained devices in Internet of Things
X Ding, X Wang, Y **e, F Li - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
With the rapid development of Internet of Things (IoT) in recent years, the security of IoT
becomes more and more prominent. To protect data privacy and device availability, identity …
becomes more and more prominent. To protect data privacy and device availability, identity …
Authentication and handover challenges and methods for drone swarms
Drones are begin used for various purposes such as border security, surveillance, cargo
delivery, visual shows and it is not possible to overcome such intensive tasks with a single …
delivery, visual shows and it is not possible to overcome such intensive tasks with a single …
A deep learning-based authentication protocol for IoT-enabled LTE systems
The connected devices in Internet-of-Things (IoT)-enabled systems are continuously
increasing nowadays, and likely to grow exponentially worldwide in near future. Hence, the …
increasing nowadays, and likely to grow exponentially worldwide in near future. Hence, the …
Blockchain-based lightweight multifactor authentication for cell-free in ultra-dense 6G-based (6-CMAS) cellular network
Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultra-dense
cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive …
cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive …
Lightweight flexible group authentication utilizing historical collaboration process information
Existing device authentication techniques may suffer from heavy communication,
computation, and storage overhead for identifying a growing number of devices in …
computation, and storage overhead for identifying a growing number of devices in …
Group handover for drone base stations
The widespread use of new technologies, such as the Internet of Things and machine-type
communication (MTC) forces an increase on the number of user equipments (UEs) and MTC …
communication (MTC) forces an increase on the number of user equipments (UEs) and MTC …