[HTML][HTML] Intelligent authentication of 5G healthcare devices: A survey

AH Sodhro, AI Awad, J van de Beek, G Nikolakopoulos - Internet of Things, 2022 - Elsevier
The dynamic nature of wireless links and the mobility of devices connected to the Internet of
Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers …

A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions

D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …

Applications and Evaluations of Bio-Inspired Approaches in Cloud Security: A Review

MM Ahsan, KD Gupta, AK Nag, S Poudyal… - IEEE …, 2020 - ieeexplore.ieee.org
Cloud computing gained much popularity in the recent past due to its many internet-based
services related to data, application, operating system, and eliminating the need for central …

New security architecture of access control in 5G MEC

Z Kotulski, W Niewolski, TW Nowak… - … Symposium on Security in …, 2020 - Springer
The currently developed 5G networks using MEC technology (5G MEC) allow for the
harmonious cooperation of many areas of the economy (called the vertical industries) within …

EAP-ZKP: a zero-knowledge proof based authentication protocol to prevent DDoS attacks at the edge in beyond 5G

G Ramezan, A Abdelnasser, B Liu… - 2021 IEEE 4th 5G …, 2021 - ieeexplore.ieee.org
5G has Introduced the primary and secondary authentication procedures to authenticate the
user equipment requesting access to mobile network operators (MNOs) and service …

Cognitive Digital Twin Systems for Predictive Security in AI-Enhanced IoT Environments

MR Kumar, U Jain, F Francis… - 2024 First …, 2024 - ieeexplore.ieee.org
The Internet has grown in importance and impact over the years, causing people to become
more reliant on it. The Internet has evolved into a major vector for cybercrime because to its …

5g secondary authentication based on eap-tls protocol

Q Hao, L Sun, S Guo, R Dou, H Liu… - … Technology and Media …, 2021 - ieeexplore.ieee.org
With the development of mobile communication technology, we have now entered the 5G
era. At the same time, vertical industries have also made new developments in 5G …

Edge computing security: Layered classification of attacks and possible countermeasures

G Nagarajan, SV Simpson, RI Minu - Advances in Computers, 2022 - Elsevier
Edge computing is a widely accepted approach in cloud based Internet of Things (IoT)
environment to overcome the issues related to traditional cloud computing. Edge offers a fast …

AI-Enhanced Virtual Twin Modelling for Strengthening IoT Software Security Protocols

B Kumara, PP Barmola, R Arora… - 2024 First …, 2024 - ieeexplore.ieee.org
To fortify security mechanisms in software systems for the Internet of Things (IoT), this article
presents a framework for AI-Enhanced Virtual Twin Modelling. In order to track and examine …

[PDF][PDF] Fuzzy Logic Based Handover Authentication in 5g Telecommunication Heterogeneous Networks.

J Divakaran, A Chakrapani, K Srihari - Comput. Syst. Sci. Eng., 2023 - researchgate.net
Under various deployment circumstances, fifth-generation (5G) telecommunications delivers
improved network compound management with fast communication channels. Due to the …