GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications

C Lai, R Lu, D Zheng, H Li, XS Shen - Computer Networks, 2016 - Elsevier
Supporting a massive number of machine to machine (M2M) devices has been considered
as an essential requirement in M2M communications. Meanwhile, cyber security is of …

Efficient handover authentication with user anonymity and untraceability for mobile cloud computing

X Yang, X Huang, JK Liu - Future Generation Computer Systems, 2016 - Elsevier
Various wireless communication technologies have been generated and deployed on
account of mass requirements. These enable cloud computing with integration with mobility …

CPPHA: Capability-based privacy-protection handover authentication mechanism for SDN-based 5G HetNets

J Cao, M Ma, Y Fu, H Li, Y Zhang - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Ultra-dense Heterogeneous network (HetNet) technique can significantly improve wireless
link quality, spectrum efficiency and system capacity, and satisfy different requirements for …

EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks

J Cao, M Ma, H Li, Y Fu, X Liu - Journal of Network and Computer …, 2018 - Elsevier
Future fifth generation (5G) wireless network will be a flexible, open, and highly
heterogeneous with densified small cell deployment and overlay coverage. The design of …

Performance and security enhanced authentication and key agreement protocol for SAE/LTE network

FB Degefa, D Lee, J Kim, Y Choi, D Won - Computer Networks, 2016 - Elsevier
Abstract In recent years, Long Term Evolution has been one of the promising technologies of
current wireless communication systems. Quality of service and data rate contribute for the …

Analysis of Bluetooth threats and v4. 0 security features

S Sandhya, KAS Devi - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
The advent of Bluetooth technology has made wireless communication easier. Any new
invention or improvement is viewed very closely by people who are looking to gain …

Analyzing the secure simple pairing in Bluetooth v4. 0

RCW Phan, P Mingard - Wireless Personal Communications, 2012 - Springer
This paper analyzes the security of Bluetooth v4. 0's Secure Simple Pairing (SSP) protocol,
for both the Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) and Bluetooth Low Energy …

[HTML][HTML] Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks

A Kumar, H Om - Digital Communications and Networks, 2020 - Elsevier
A variety of wireless communication technologies have been developed to provide services
to a large number of users. The future integrated 5G-WLAN wireless networks will support …

A privacy-preserving authentication protocol with secure handovers for the LTE/LTE-A networks

G Singh, D Shrimankar - Sādhanā, 2018 - Springer
Abstract Long-Term Evolution/Long-Term Evolution Advanced (LTE/LTE-A) is the latest
mobile communication technology that is offering high data rates and robust performance to …

An efficient design and validation technique for secure handover between 3GPP LTE and WLANs systems

I Elbouabidi, F Zarai, MS Obaidat, L Kamoun - Journal of Systems and …, 2014 - Elsevier
Future generations wireless systems, which integrate different wireless access networks
together, will support a secured seamless mobility and a wide variety of applications and …