Survey on wireless network security

R Nazir, AA Laghari, K Kumar, S David… - Archives of Computational …, 2021 - Springer
A wireless network is used to connect various wired organizational structures and provide
connectivity within the organization for employees to move freely by avoiding the hurdle of a …

A secure mutual authentication protocol for IoT environment

PK Panda, S Chattopadhyay - Journal of Reliable Intelligent Environments, 2020 - Springer
Rapid development in the field of Internet of Things (IoT) has made it possible to connect
many embedded devices to the internet for the sharing of data. Since, the embedded device …

An improved authentication and security scheme for LTE/LTE-A networks

PK Panda, S Chattopadhyay - Journal of Ambient Intelligence and …, 2020 - Springer
Long term evolution (LTE) and LTE-Advanced networks support highly developed
authentication and encryption mechanisms. However, these systems still suffer from various …

Analysis of direct traffic at the transport protocol level in the WiMax-1/2 cluster oriented to offload the smart city's wireless ecosystem

V Kovtun, K Grochla, S Aldosary… - Royal Society Open …, 2024 - royalsocietypublishing.org
Rerouting of direct information traffic under the WiMax-1/2 technology control in the case of
licensed frequency spectrum overload ensures communication continuity in the smart city's …

[PDF][PDF] A Cybersecurity model for the enhancement of wimax-based wirless communications infrastructure to serve smart grid applications

F Alsharbaty, Q Ali - International journal of smart grid, 2023 - researchgate.net
This research paper addresses on a secured wireless communications network (WCN)
based on WiMAX infrastructure for smart grid applications. The proposed infrastructure …

A strong mutual authentication protocol for securing wearable smart textile applications

H Dalkilic, MH Özcanhan - Advances in Electrical and …, 2022 - search.proquest.com
With increasing modern technology involvement in numerous consumer areas, our cities are
gradually turning into smart urban areas. Wireless technologies have especially been …

Efficient signal transmission algorithms for remote sensing gamma radiation over developed mobil WiMax network

MS El_Tokhy - International Journal of Communication …, 2023 - Wiley Online Library
This paper overcomes two key issues within radiation monitoring networks. Secure and
accurate transmission of detected gamma radiation in remote areas is the first challenge …

An enhanced secure authentication and key agreement scheme for LTE networks

PK Panda, S Chattopadhyay - 2018 3rd International …, 2018 - ieeexplore.ieee.org
The Evolved Packet System Authentication and Key Agreement (EPS-AKA) scheme
provides security in Long Term Evaluation (LTE) network. However, EPS-AKA is vulnerable …

Formal Analysis of SA-TEK 3-Way Handshake Protocols

S Xu, S Yang, K Zhang - Journal of Shanghai Jiaotong University (Science …, 2023 - Springer
IEEE 802.16 is the standard for broadband wireless access. The security sublayer is
provided within IEEE 802.16 MAC layer for privacy and access control, in which the privacy …

Dynamic key encryption using the embedded three pass protocol for securing TCP Streams in WiMAX link

Suherman, M Al-Akaidi - American University in the Emirates International …, 2020 - Springer
This paper proposes embedded three pass protocol (TPP) for securing TCP streams through
the worldwide interoperability microwave access (WiMAX) link. TPP messages are …