Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things

VO Nyangaresi, M Ahmad, A Alkhayyat… - Expert Systems, 2022 - Wiley Online Library
Driven by the requirements for entirely low communication latencies, high bandwidths,
reliability and capacities, the Fifth Generation (5G) networks has been deployed in a number …

A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things

Z Zhang, S Zhou - Computer Networks, 2021 - Elsevier
Abstract Internet of Things (IoT) networks has been widely deployed as the distributed
computing and communication component in the smart city. The security problems in the …

Towards security and privacy preservation in 5G networks

VO Nyangaresi, ZA Abduljabbar… - 2021 29th …, 2021 - ieeexplore.ieee.org
The Fifth Generation (5G) networks support various service delivery models such as Device
to Device (D2D) communication, Unmanned Aerial Vehicles (UAVs) and Vehicular Ad Hoc …

[PDF][PDF] A Formally Verified Authentication Scheme for mmWave Heterogeneous Networks

VO Nyangaresi - the 6th International Conference on Combinatorics …, 2021 - i4c.iust.ac.ir
The 5G mmWave networks support massive number of devices and offer salient features
such as very low communication latencies and high signal stability. This has seen these …

Practical and Secure Password Authentication and Key Agreement Scheme Based Dual-Server for IoT Devices in 5G Network

S Zhang, Y Liu, T Gao, Y ** on the security of 5G and vertical applications
Á Sobrinho, MVP dos Santos, AB Silva, DFS Santos… - 2023 - researchsquare.com
The deployment of 5G infrastructure is one of the main vectors for new application scenarios
since it enables enhanced data bandwidth, low latency, and comprehensive signal …