GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications
Supporting a massive number of machine to machine (M2M) devices has been considered
as an essential requirement in M2M communications. Meanwhile, cyber security is of …
as an essential requirement in M2M communications. Meanwhile, cyber security is of …
Efficient handover authentication with user anonymity and untraceability for mobile cloud computing
Various wireless communication technologies have been generated and deployed on
account of mass requirements. These enable cloud computing with integration with mobility …
account of mass requirements. These enable cloud computing with integration with mobility …
CPPHA: Capability-based privacy-protection handover authentication mechanism for SDN-based 5G HetNets
Ultra-dense Heterogeneous network (HetNet) technique can significantly improve wireless
link quality, spectrum efficiency and system capacity, and satisfy different requirements for …
link quality, spectrum efficiency and system capacity, and satisfy different requirements for …
EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks
Future fifth generation (5G) wireless network will be a flexible, open, and highly
heterogeneous with densified small cell deployment and overlay coverage. The design of …
heterogeneous with densified small cell deployment and overlay coverage. The design of …
Performance and security enhanced authentication and key agreement protocol for SAE/LTE network
FB Degefa, D Lee, J Kim, Y Choi, D Won - Computer Networks, 2016 - Elsevier
Abstract In recent years, Long Term Evolution has been one of the promising technologies of
current wireless communication systems. Quality of service and data rate contribute for the …
current wireless communication systems. Quality of service and data rate contribute for the …
Analysis of Bluetooth threats and v4. 0 security features
S Sandhya, KAS Devi - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
The advent of Bluetooth technology has made wireless communication easier. Any new
invention or improvement is viewed very closely by people who are looking to gain …
invention or improvement is viewed very closely by people who are looking to gain …
Analyzing the secure simple pairing in Bluetooth v4. 0
RCW Phan, P Mingard - Wireless Personal Communications, 2012 - Springer
This paper analyzes the security of Bluetooth v4. 0's Secure Simple Pairing (SSP) protocol,
for both the Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) and Bluetooth Low Energy …
for both the Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) and Bluetooth Low Energy …
[HTML][HTML] Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks
A variety of wireless communication technologies have been developed to provide services
to a large number of users. The future integrated 5G-WLAN wireless networks will support …
to a large number of users. The future integrated 5G-WLAN wireless networks will support …
A privacy-preserving authentication protocol with secure handovers for the LTE/LTE-A networks
G Singh, D Shrimankar - Sādhanā, 2018 - Springer
Abstract Long-Term Evolution/Long-Term Evolution Advanced (LTE/LTE-A) is the latest
mobile communication technology that is offering high data rates and robust performance to …
mobile communication technology that is offering high data rates and robust performance to …
An efficient design and validation technique for secure handover between 3GPP LTE and WLANs systems
I Elbouabidi, F Zarai, MS Obaidat, L Kamoun - Journal of Systems and …, 2014 - Elsevier
Future generations wireless systems, which integrate different wireless access networks
together, will support a secured seamless mobility and a wide variety of applications and …
together, will support a secured seamless mobility and a wide variety of applications and …