An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenario

P Borgohain, H Choudhury - Journal of Network and Computer …, 2024 - Elsevier
Abstract 5G-assisted Device to Device (D2D) communication can be broadly categorized
into three use case scenarios: In Coverage, Relay Coverage, and Out-of Coverage. The …

Hierarchical-fuzzy allocation and multi-parameter adjustment prediction for industrial loading optimisation

Z Chen, C Wang, H **, J Li, S Zhang… - Connection …, 2022 - Taylor & Francis
Conventional manual-programmable logic controller systems have confronted the problems
of the unbalance load and the unreasonable bins allocation in industrial loading field …

ERAM-EE: Efficient resource allocation and management strategies with energy efficiency under fog–internet of things environments

P Periasamy, R Ujwala, K Srikar, YV Durga Sai… - Connection …, 2024 - Taylor & Francis
Due to technological advancements, most devices are generating a significant amount of
data which needs appropriate technology to handle the data generated by IoT devices. Fog …

Enhancing Resilience in Next-Generation Wireless Networks Through Deep Learning for Security Enhancement

EB Ashary, LA Maghrabi, S Jambi… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Safeguarding strong protection and efficient intrusion recognition are important reflections in
the growth and protection of Next-Generation Wireless Networks. These original networks …

Improving drone security in smart cities via lightweight cryptography

R Pizzolante, A Castiglione, F Palmieri… - … Science and Its …, 2023 - Springer
Abstract In recent years, Unmanned Aerial Vehicles (UAVs) have become increasingly
popular. It is estimated that the UAV market will continue to grow to reach $27.4 billion by …

Security Threats and Mitigation Approaches for D2D Communication in 5G & B5G Wireless Networks

M Irfan, A Waseem, R Mardeni, U Umar… - 2023 International …, 2023 - ieeexplore.ieee.org
The 5G & B5G networks are densified heterogeneous wireless networks designed to
increase throughput and reduce latency. D2D direct communication between devices, is a …

[PDF][PDF] An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS.

H Park, TG Kim, DG Duguma, J Kim… - … Systems Science & …, 2023 - cdn.techscience.cn
Network operators are attempting many innovations and changes in 5G using self-
organizing networks (SON). The SON operates on the measurement reports (MR), which are …

Systematic Literature Review on 5G-IoT Security Aspects

D Valadares, N Will, Á Sobrinho, A Lima, I Morais… - 2023 - preprints.org
The 5G technology brings many benefits already known: large connection capacity, great
transmission velocities, and low latencies with high reliability. One of its core services, the …

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

AM Allam - KSII Transactions on Internet and Information Systems …, 2023 - koreascience.kr
One of the fastest-growing mobile services accessible today is mobile payments. For the
safety of this service, the Near Field Communication (NFC) technology is used. However …

Artificial Intelligence Technology in Computer Network Security

C Lao, S Qin - International Conference on Innovative Computing, 2023 - Springer
Currently, computer networks are evolving in an extensive and highly distributed direction,
Data centers based on traditional networks are gradually migrating to cloud data centers …