[HTML][HTML] Intelligent authentication of 5G healthcare devices: A survey
The dynamic nature of wireless links and the mobility of devices connected to the Internet of
Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers …
Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers …
Survey on joint paradigm of 5G and SDN emerging mobile technologies: Architecture, security, challenges and research directions
Modern communication systems are probable to surface new challenges while introducing
innovative fronts concerning context consciousness in wireless networks. The main outcome …
innovative fronts concerning context consciousness in wireless networks. The main outcome …
Cross-layer device authentication with quantum encryption for 5G enabled IIoT in industry 4.0
Industrial Internet of Things (IIoT), a core enabler of Industry 4.0, is evolving rapidly to tackle
the challenges imposed by explosive real-time manufacturing data in the context of Internet …
the challenges imposed by explosive real-time manufacturing data in the context of Internet …
Session Key Agreement Protocol for Secure D2D Communication
VO Nyangaresi, Z Mohammad - … Conference on Safety and Security with …, 2022 - Springer
Device to device (D2D) communication offers numerous benefits such as low latencies, high
throughputs, spectral efficiency boosting, and base station energy reduction. However, lack …
throughputs, spectral efficiency boosting, and base station energy reduction. However, lack …
Blockchain technology for secured healthcare data communication among the non-terminal nodes in IoT architecture in 5G network
In the contemporary world, with ever-evolving internet models in the process of automating
and digitalizing various industrial and domestic implementations, the Internet of Things (IoT) …
and digitalizing various industrial and domestic implementations, the Internet of Things (IoT) …
A survey of resource management in D2D communication for B5G networks
Due to the vast rise of users, the variety of application requirements, and the enormous
necessity for ubiquitous connectivity anytime and anywhere, integration of new technologies …
necessity for ubiquitous connectivity anytime and anywhere, integration of new technologies …
A lightweight D2D authentication protocol for relay coverage scenario in 5G mobile network
P Borgohain, H Choudhury - Computer Networks, 2023 - Elsevier
Abstract 5G cellular network is becoming a preferred communication network for deployment
of the Internet of Things (IoT), due to its high speed, better connectivity, increased …
of the Internet of Things (IoT), due to its high speed, better connectivity, increased …
SINR based energy optimization schemes for 5G vehicular sensor networks
Abstract In Vehicular Sensor Networks (VSNs), the configuration of connected vehicles is in
such a manner that enhances the data traffic. Due to this challenge, researchers have …
such a manner that enhances the data traffic. Due to this challenge, researchers have …
Detection of DDoS attacks in D2D communications using machine learning approach
In device-to-device (D2D) communications, distributed Denial-of-Service (DDoS) attacks can
be quite detrimental because it can result in network structure destruction. Towards this end …
be quite detrimental because it can result in network structure destruction. Towards this end …
A novel Distributed AI framework with ML for D2D communication in 5G/6G networks
Inspired by the adoption of Artificial Intelligence (AI) and Machine Learning (ML) approaches
in 5G and 6G networks, in this paper we propose a novel ML based Distributed AI (DAI) …
in 5G and 6G networks, in this paper we propose a novel ML based Distributed AI (DAI) …