An AKA protocol for 5G-assisted D2D communication in Out-of-Coverage scenario
Abstract 5G-assisted Device to Device (D2D) communication can be broadly categorized
into three use case scenarios: In Coverage, Relay Coverage, and Out-of Coverage. The …
into three use case scenarios: In Coverage, Relay Coverage, and Out-of Coverage. The …
Hierarchical-fuzzy allocation and multi-parameter adjustment prediction for industrial loading optimisation
Z Chen, C Wang, H **, J Li, S Zhang… - Connection …, 2022 - Taylor & Francis
Conventional manual-programmable logic controller systems have confronted the problems
of the unbalance load and the unreasonable bins allocation in industrial loading field …
of the unbalance load and the unreasonable bins allocation in industrial loading field …
ERAM-EE: Efficient resource allocation and management strategies with energy efficiency under fog–internet of things environments
P Periasamy, R Ujwala, K Srikar, YV Durga Sai… - Connection …, 2024 - Taylor & Francis
Due to technological advancements, most devices are generating a significant amount of
data which needs appropriate technology to handle the data generated by IoT devices. Fog …
data which needs appropriate technology to handle the data generated by IoT devices. Fog …
Enhancing Resilience in Next-Generation Wireless Networks Through Deep Learning for Security Enhancement
Safeguarding strong protection and efficient intrusion recognition are important reflections in
the growth and protection of Next-Generation Wireless Networks. These original networks …
the growth and protection of Next-Generation Wireless Networks. These original networks …
Improving drone security in smart cities via lightweight cryptography
Abstract In recent years, Unmanned Aerial Vehicles (UAVs) have become increasingly
popular. It is estimated that the UAV market will continue to grow to reach $27.4 billion by …
popular. It is estimated that the UAV market will continue to grow to reach $27.4 billion by …
Security Threats and Mitigation Approaches for D2D Communication in 5G & B5G Wireless Networks
The 5G & B5G networks are densified heterogeneous wireless networks designed to
increase throughput and reduce latency. D2D direct communication between devices, is a …
increase throughput and reduce latency. D2D direct communication between devices, is a …
[PDF][PDF] An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS.
Network operators are attempting many innovations and changes in 5G using self-
organizing networks (SON). The SON operates on the measurement reports (MR), which are …
organizing networks (SON). The SON operates on the measurement reports (MR), which are …
Systematic Literature Review on 5G-IoT Security Aspects
The 5G technology brings many benefits already known: large connection capacity, great
transmission velocities, and low latencies with high reliability. One of its core services, the …
transmission velocities, and low latencies with high reliability. One of its core services, the …
Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System
AM Allam - KSII Transactions on Internet and Information Systems …, 2023 - koreascience.kr
One of the fastest-growing mobile services accessible today is mobile payments. For the
safety of this service, the Near Field Communication (NFC) technology is used. However …
safety of this service, the Near Field Communication (NFC) technology is used. However …
Artificial Intelligence Technology in Computer Network Security
C Lao, S Qin - International Conference on Innovative Computing, 2023 - Springer
Currently, computer networks are evolving in an extensive and highly distributed direction,
Data centers based on traditional networks are gradually migrating to cloud data centers …
Data centers based on traditional networks are gradually migrating to cloud data centers …