A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …
Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review
There are continued advances in the internet and communication fields regarding the
deployment of 5G-based applications. It is expected that by 2030, 6G applications will …
deployment of 5G-based applications. It is expected that by 2030, 6G applications will …
Strengthening cloud security: an innovative multi-factor multi-layer authentication framework for cloud user authentication
Cloud multi-factor authentication is a critical security measure that helps strengthen cloud
security from unauthorized access and data breaches. Multi-factor authentication verifies …
security from unauthorized access and data breaches. Multi-factor authentication verifies …
Lightweight multifactor authentication scheme for nextgen cellular networks
With increased interest in 6G (6th Generation) cellular networks that can support intelligently
small-cell communication will result in effective device-to-device (D2D) communication. High …
small-cell communication will result in effective device-to-device (D2D) communication. High …
Blockchain-based lightweight multifactor authentication for cell-free in ultra-dense 6G-based (6-CMAS) cellular network
Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultra-dense
cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive …
cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive …
MS‐ADS: multistage spectrogram image‐based anomaly detection system for IoT security
The innovative computing idea of Internet‐of‐Things (IoT) architecture has gained
tremendous popularity over the last decade, resulting in an exponential increase in the …
tremendous popularity over the last decade, resulting in an exponential increase in the …
[PDF][PDF] Security Concerns in Electronic Files Authenticated Systems
FT Johnson, EO Joseph, AF Akande - COJ Rob Artificial Intel, 2024 - researchgate.net
Traditional file management systems and manual processes have presented a number of
difficulties and restrictions, such as difficult administration, inadequate security, and …
difficulties and restrictions, such as difficult administration, inadequate security, and …
IoT networks: Security vulnerabilities of application layer protocols
Enabling objects to work intelligently through various communication technologies is a
common phenomenon. Objects become intelligent and are allowed to work autonomously …
common phenomenon. Objects become intelligent and are allowed to work autonomously …
S-ADS: spectrogram image-based anomaly detection system for IoT networks
The Internet of things (IoT) is the smart concept of connecting devices equipped with various
sensors, actuators, memory, computational and communicational capabilities using the …
sensors, actuators, memory, computational and communicational capabilities using the …
Employing public key infrastructure to encapsulate messages during transport layer security handshake procedure
The Transport Layer ensures that data is sent transparently between end-users while also
enabling reliable data transfer services to the higher levels. Cryptographic protocols Secure …
enabling reliable data transfer services to the higher levels. Cryptographic protocols Secure …