An efficient authentication and key agreement protocol for 4G (LTE) networks
Long Term Evolution (LTE) networks designed by 3rd Generation Partnership Project (3GPP) represent a widespread technology. LTE is mainly influenced by high data rates, minimum delay and the capacity due to scalable bandwidth and its flexibility. With the rapid and widespread use LTE networks, and i...
| Main Authors: | Alezabi, Kamal Ali, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Mohd Ali, Borhanuddin |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/47995/ http://psasir.upm.edu.my/id/eprint/47995/1/An%20efficient%20authentication%20and%20key%20agreement%20protocol%20for%204G%20%28LTE%29%20networks.pdf |
Similar Items
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
by: Alezabi, Kamal Ali, et al.
Published: (2020)
by: Alezabi, Kamal Ali, et al.
Published: (2020)
Authentication process enhancements in WiMAX networks
by: Alezabi, Kamal Ali, et al.
Published: (2016)
by: Alezabi, Kamal Ali, et al.
Published: (2016)
A new tunnelled EAP based authentication method for WiMAX networks
by: Alezabi, Kamal Ali Ahmed, et al.
Published: (2013)
by: Alezabi, Kamal Ali Ahmed, et al.
Published: (2013)
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
by: Khalid, Haqi, et al.
Published: (2023)
by: Khalid, Haqi, et al.
Published: (2023)
Authentication groups with privacy-protection of machine in LTE/LTE-A networks
by: Ismail, Haqi Khalid, et al.
Published: (2017)
by: Ismail, Haqi Khalid, et al.
Published: (2017)
Review of channel quality indicator estimation schemes for multi-user MIMO in 3GPP LTE/LTE-a systems
by: Abdulhasan, Muntadher Qasim, et al.
Published: (2014)
by: Abdulhasan, Muntadher Qasim, et al.
Published: (2014)
Modeling of efficient key management method in multicast networks.
by: Mehdizadeh, Abbas, et al.
by: Mehdizadeh, Abbas, et al.
A modified group authentication scheme for machine type communication in LTE/LTE-a networks
by: Ismail, Haqi Khalid
Published: (2018)
by: Ismail, Haqi Khalid
Published: (2018)
Energy efficiency of coordinated multipoint transmission (CoMP) over LTE-A
by: Mohamed Yusoff, Zainatul Yushaniza, et al.
Published: (2017)
by: Mohamed Yusoff, Zainatul Yushaniza, et al.
Published: (2017)
Energy efficient transmission for LTE cellular system
by: Salman, Mustafa Ismael, et al.
Published: (2012)
by: Salman, Mustafa Ismael, et al.
Published: (2012)
Security of a key agreement protocol based on chaotic maps
by: Han, Song
Published: (2008)
by: Han, Song
Published: (2008)
A threshold feedback compression scheme of channel quality indicator (CQI) in LTE systems
by: Abdulhasan, Muntadher Qasim, et al.
Published: (2013)
by: Abdulhasan, Muntadher Qasim, et al.
Published: (2013)
Smart geographical routing protocol achieving high QoS and energy efficiency based for wireless multimedia sensor networks
by: Hussein, Wael Ali, et al.
Published: (2021)
by: Hussein, Wael Ali, et al.
Published: (2021)
An energy saving scheme for key management protocol in IEEE802.16e
by: Gilanian Sadeghi, Mohammad Mehdi, et al.
Published: (2013)
by: Gilanian Sadeghi, Mohammad Mehdi, et al.
Published: (2013)
Energy efficient Two Stage Chain Routing Protocol (TSCP) for wireless sensor networks
by: Kareem, Husam, et al.
Published: (2014)
by: Kareem, Husam, et al.
Published: (2014)
QoS downlink schedulers in LTE towards 5G network
by: Ahmed Al-Sakkaf, Ahmed Gaafar, et al.
Published: (2016)
by: Ahmed Al-Sakkaf, Ahmed Gaafar, et al.
Published: (2016)
QOS downlink schedulers in LTE towards 5G
network
by: Al-Sakkaf, Ahmed Gaafar, et al.
Published: (2015)
by: Al-Sakkaf, Ahmed Gaafar, et al.
Published: (2015)
Approximate linear minimum mean square error estimation based on channel quality indicator feedback in LTE systems
by: Abdulhasan, Muntadher Qasim, et al.
Published: (2013)
by: Abdulhasan, Muntadher Qasim, et al.
Published: (2013)
QoE-oriented cross-layer downlink scheduling for heterogeneous traffics in LTE networks
by: Nasimi, Meysam, et al.
Published: (2013)
by: Nasimi, Meysam, et al.
Published: (2013)
Comparative study on 4G/LTE cryptographic algorithms based on different factors
by: Ghanim, Alyaa, et al.
Published: (2014)
by: Ghanim, Alyaa, et al.
Published: (2014)
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
by: Al-Alak, Saif M. Kh.
Published: (2014)
by: Al-Alak, Saif M. Kh.
Published: (2014)
Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
A secure data authentication in wireless body area network
for health monitoring using electrocardiogram-based
key agreement
by: Ramli, Sofia Najwa, et al.
Published: (2016)
by: Ramli, Sofia Najwa, et al.
Published: (2016)
A secure data authentication in wireless body area network for health monitoring using electrocardiogram-based key agreement
by: Ramli, Sofia Najwa, et al.
Published: (2016)
by: Ramli, Sofia Najwa, et al.
Published: (2016)
Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
Protocol of secure key distribution using hash functions and quantum authenticated channels key distribution process six-state quantum protocol
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
by: Majeed, Mohammed Munther A., et al.
Published: (2010)
Enhanced handover mechanism in long term evolution (LTE) networks
by: Hussein, Yaseein Soubhi, et al.
Published: (2011)
by: Hussein, Yaseein Soubhi, et al.
Published: (2011)
Throughput-aware resource allocation for QoS classes in
LTE networks
by: Ferdosian, Nasim, et al.
Published: (2015)
by: Ferdosian, Nasim, et al.
Published: (2015)
On fractional and semi-soft handover in long term evolution(LTE) networks
by: Hussein, Yaseein Soubhi, et al.
Published: (2011)
by: Hussein, Yaseein Soubhi, et al.
Published: (2011)
A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
Adjusting the LTE structural design to 5G: prospects and challenges
by: Alam, Md Shamsul, et al.
Published: (2020)
by: Alam, Md Shamsul, et al.
Published: (2020)
Decentralized time domain muting for interference mitigation in LTE-advanced heterogeneous networks
by: Gadam, Mohammed Aliyu, et al.
Published: (2015)
by: Gadam, Mohammed Aliyu, et al.
Published: (2015)
MCRP: multiple chain routing protocol for energy efficiency in homogeneous wireless sensor networks
by: Kareem, Husam, et al.
Published: (2019)
by: Kareem, Husam, et al.
Published: (2019)
Review of adaptive cell selection techniques in LTE-advanced heterogeneous networks
by: Gadam, M. A., et al.
Published: (2016)
by: Gadam, M. A., et al.
Published: (2016)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
Efficient beamforming and spectral efficiency maximization in a joint transmission LTE-A system
by: Faisal, Ali Raed
Published: (2016)
by: Faisal, Ali Raed
Published: (2016)
An authentication protocol for mobile cellular network
by: Mohammed, Lawan Ahmed, et al.
Published: (2002)
by: Mohammed, Lawan Ahmed, et al.
Published: (2002)
Similar Items
-
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
by: Alezabi, Kamal Ali, et al.
Published: (2020) -
Authentication process enhancements in WiMAX networks
by: Alezabi, Kamal Ali, et al.
Published: (2016) -
A new tunnelled EAP based authentication method for WiMAX networks
by: Alezabi, Kamal Ali Ahmed, et al.
Published: (2013) -
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023) -
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)