4.7 Article

FastHand: A fast handover authentication protocol for densely deployed small-cell networks

Related references

Note: Only part of the references are listed.
Article Telecommunications

SEAI: Secrecy and Efficiency Aware Inter-gNB Handover Authentication and Key Agreement Protocol in 5G Communication Network

Shubham Gupta et al.

Summary: 3GPP has proposed a 5G handover key structure and framework to address the security vulnerabilities in existing authentication mechanisms. The introduction of the SEAI handover AKA protocol aims to enhance the security and efficiency of 5G network.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Computer Science, Hardware & Architecture

An enhanced symmetric-key based 5G-AKA protocol

Jorge Munilla et al.

Summary: 5G technology has the potential to revolutionize wireless communications and enable the Internet of Everything. However, new protocols such as 5G-AKA have been found to have security vulnerabilities that need to be addressed. Efforts are being made to enhance privacy protection and address potential attacks in these protocols.

COMPUTER NETWORKS (2021)

Article Computer Science, Hardware & Architecture

Robust and Universal Seamless Handover Authentication in 5G HetNets

Yinghui Zhang et al.

Summary: The evolving 5G cellular networks require security and efficiency for frequent handovers, and the RUSH protocol proposed in this paper addresses existing authentication challenges while achieving universality and robustness. RUSH utilizes chameleon hash functions and blockchains to enable anonymous mutual authentication with key agreement, and it has been proven to resist various attacks while outperforming other schemes in both computation and communication efficiency.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2021)

Article Computer Science, Information Systems

Desynchronization resistant privacy preserving user authentication protocol for location based services

Prasanta Kumar Roy et al.

Summary: This article introduces a privacy-preserving user authentication protocol for location-based services based on elliptic curve cryptography, which includes dynamic randomized counters to synchronize the peers.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Computer Science, Information Systems

Is 5G Handover Secure and Private? A Survey

Dongsheng Zhao et al.

Summary: The 5G mobile cellular communication and networking system is flexible and heterogeneous, leading to security and privacy risks from continual vertical and horizontal handovers. Despite proposed mechanisms, further research and exploration of open issues are needed to address these challenges effectively.

IEEE INTERNET OF THINGS JOURNAL (2021)

Article Computer Science, Theory & Methods

ReHand: Secure Region-Based Fast Handover With User Anonymity for Small Cell Networks in Mobile Communications

Chun- Fan et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Information Systems

Analysis of Error Impact for Batch Handover Authentication Protocols in Mobile Wireless Networks

Younsoo Park et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

SDN-Based Handover Authentication Scheme for Mobile Edge Computing in Cyber-Physical Systems

Cong Wang et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network

Shubham Gupta et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2019)

Article Computer Science, Information Systems

A Hybrid Authentication Protocol for LTE/LTE-A Nework

Jianhong Zhou et al.

IEEE ACCESS (2019)

Article Automation & Control Systems

Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks

Ding Wang et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Review Computer Science, Hardware & Architecture

Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

Mohamed Amine Ferrag et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Hardware & Architecture

A proxy signature-based handover authentication scheme for LTE wireless networks

Yue Qiu et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Article Computer Science, Hardware & Architecture

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography

Debiao He et al.

COMPUTER NETWORKS (2017)

Article Computer Science, Theory & Methods

Efficient handover authentication with user anonymity and untraceability for Mobile Cloud Computing

Xu Yang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2016)

Article Engineering, Electrical & Electronic

A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks

Chin-Chen Chang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2016)

Article Computer Science, Hardware & Architecture

USER-CENTRIC ULTRA-DENSE NETWORKS FOR 5G: CHALLENGES, METHODOLOGIES, AND DIRECTIONS

Shanzhi Chen et al.

IEEE WIRELESS COMMUNICATIONS (2016)

Article Computer Science, Hardware & Architecture

Handover Authentication for Mobile Networks: Security and Efficiency Aspects

Daojing He et al.

IEEE NETWORK (2015)

Article Computer Science, Information Systems

A Survey on Security Aspects for LTE and LTE-A Networks

Jin Cao et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Computer Science, Hardware & Architecture

Handauth: Efficient Handover Authentication with Conditional Privacy for Wireless Networks

Daojing He et al.

IEEE TRANSACTIONS ON COMPUTERS (2013)

Article Computer Science, Information Systems

An Investigation on LTE Mobility Management

Ren-Huang Liou et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2013)

Article Computer Science, Hardware & Architecture

A simple and robust handover authentication between HeNB and eNB in LTE networks

Jin Cao et al.

COMPUTER NETWORKS (2012)

Article Telecommunications

Analysis and Improvement of a Secure and Efficient Handover Authentication for Wireless Networks

Daojing He et al.

IEEE COMMUNICATIONS LETTERS (2012)

Article Engineering, Electrical & Electronic

Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions

Daojing He et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2012)

Article Engineering, Electrical & Electronic

Privacy-Preserving Universal Authentication Protocol for Wireless Communications

Daojing He et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2011)

Article Computer Science, Information Systems

Denial-of-service in wireless sencsor networks: Attacks and defenses

David R. Raymond et al.

IEEE PERVASIVE COMPUTING (2008)

Article Computer Science, Theory & Methods

Automated Security Protocol Analysis With the AVISPA Tool

Luca Vigano

ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE (2006)

Article Computer Science, Hardware & Architecture

Denial of service in sensor networks

AD Wood et al.

COMPUTER (2002)

Article Computer Science, Theory & Methods

The state of elliptic curve cryptography

N Koblitz et al.

DESIGNS CODES AND CRYPTOGRAPHY (2000)