Related references
Note: Only part of the references are listed.SEAI: Secrecy and Efficiency Aware Inter-gNB Handover Authentication and Key Agreement Protocol in 5G Communication Network
Shubham Gupta et al.
WIRELESS PERSONAL COMMUNICATIONS (2022)
An enhanced symmetric-key based 5G-AKA protocol
Jorge Munilla et al.
COMPUTER NETWORKS (2021)
Robust and Universal Seamless Handover Authentication in 5G HetNets
Yinghui Zhang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)
Desynchronization resistant privacy preserving user authentication protocol for location based services
Prasanta Kumar Roy et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)
Is 5G Handover Secure and Private? A Survey
Dongsheng Zhao et al.
IEEE INTERNET OF THINGS JOURNAL (2021)
ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications
Chun- Fan et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Analysis of Error Impact for Batch Handover Authentication Protocols in Mobile Wireless Networks
Younsoo Park et al.
IEEE ACCESS (2020)
PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks
Ruhui Ma et al.
AD HOC NETWORKS (2019)
SDN-Based Handover Authentication Scheme for Mobile Edge Computing in Cyber-Physical Systems
Cong Wang et al.
IEEE INTERNET OF THINGS JOURNAL (2019)
PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network
Shubham Gupta et al.
PEER-TO-PEER NETWORKING AND APPLICATIONS (2019)
A Hybrid Authentication Protocol for LTE/LTE-A Nework
Jianhong Zhou et al.
IEEE ACCESS (2019)
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
Ding Wang et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)
Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
Mohamed Amine Ferrag et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)
A proxy signature-based handover authentication scheme for LTE wireless networks
Yue Qiu et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography
Debiao He et al.
COMPUTER NETWORKS (2017)
Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing
Xu Yang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)
A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
Chin-Chen Chang et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)
USER-CENTRIC ULTRA-DENSE NETWORKS FOR 5G: CHALLENGES, METHODOLOGIES, AND DIRECTIONS
Shanzhi Chen et al.
IEEE WIRELESS COMMUNICATIONS (2016)
Handover Authentication for Mobile Networks: Security and Efficiency Aspects
Daojing He et al.
IEEE NETWORK (2015)
A Survey on Security Aspects for LTE and LTE-A Networks
Jin Cao et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)
Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks
Daojing He et al.
IEEE TRANSACTIONS ON COMPUTERS (2013)
An Investigation on LTE Mobility Management
Ren-Huang Liou et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2013)
A simple and robust handover authentication between HeNB and eNB in LTE networks
Jin Cao et al.
COMPUTER NETWORKS (2012)
Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks
Daojing He et al.
IEEE COMMUNICATIONS LETTERS (2012)
Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions
Daojing He et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2012)
Privacy-Preserving Universal Authentication Protocol for Wireless Communications
Daojing He et al.
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2011)
Denial-of-service in wireless sencsor networks: Attacks and defenses
David R. Raymond et al.
IEEE PERVASIVE COMPUTING (2008)
Automated Security Protocol Analysis With the AVISPA Tool
Luca Vigano
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE (2006)
Denial of service in sensor networks
AD Wood et al.
COMPUTER (2002)
The state of elliptic curve cryptography
N Koblitz et al.
DESIGNS CODES AND CRYPTOGRAPHY (2000)