[HTML][HTML] Intelligent authentication of 5G healthcare devices: A survey
The dynamic nature of wireless links and the mobility of devices connected to the Internet of
Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers …
Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers …
A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions
D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …
high-speed data transfer. The data collected fuel many automation applications such as …
Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review
Cloud computing gained much popularity in the recent past due to its many internet-based
services related to data, application, operating system, and eliminating the need for central …
services related to data, application, operating system, and eliminating the need for central …
New security architecture of access control in 5G MEC
The currently developed 5G networks using MEC technology (5G MEC) allow for the
harmonious cooperation of many areas of the economy (called the vertical industries) within …
harmonious cooperation of many areas of the economy (called the vertical industries) within …
EAP-ZKP: a zero-knowledge proof based authentication protocol to prevent DDoS attacks at the edge in beyond 5G
5G has Introduced the primary and secondary authentication procedures to authenticate the
user equipment requesting access to mobile network operators (MNOs) and service …
user equipment requesting access to mobile network operators (MNOs) and service …
Cognitive Digital Twin Systems for Predictive Security in AI-Enhanced IoT Environments
MR Kumar, U Jain, F Francis… - 2024 First …, 2024 - ieeexplore.ieee.org
The Internet has grown in importance and impact over the years, causing people to become
more reliant on it. The Internet has evolved into a major vector for cybercrime because to its …
more reliant on it. The Internet has evolved into a major vector for cybercrime because to its …
5g secondary authentication based on eap-tls protocol
Q Hao, L Sun, S Guo, R Dou, H Liu… - … Technology and Media …, 2021 - ieeexplore.ieee.org
With the development of mobile communication technology, we have now entered the 5G
era. At the same time, vertical industries have also made new developments in 5G …
era. At the same time, vertical industries have also made new developments in 5G …
Edge computing security: Layered classification of attacks and possible countermeasures
Edge computing is a widely accepted approach in cloud based Internet of Things (IoT)
environment to overcome the issues related to traditional cloud computing. Edge offers a fast …
environment to overcome the issues related to traditional cloud computing. Edge offers a fast …
AI-Enhanced Virtual Twin Modelling for Strengthening IoT Software Security Protocols
To fortify security mechanisms in software systems for the Internet of Things (IoT), this article
presents a framework for AI-Enhanced Virtual Twin Modelling. In order to track and examine …
presents a framework for AI-Enhanced Virtual Twin Modelling. In order to track and examine …
[PDF][PDF] Fuzzy Logic Based Handover Authentication in 5g Telecommunication Heterogeneous Networks.
J Divakaran, A Chakrapani, K Srihari - Comput. Syst. Sci. Eng., 2023 - researchgate.net
Under various deployment circumstances, fifth-generation (5G) telecommunications delivers
improved network compound management with fast communication channels. Due to the …
improved network compound management with fast communication channels. Due to the …