Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper proposes authentication and re-authentication protocols for 4G wireless networks, in particular, LTE-Advanced (LTE-A), WLAN, and WiM...
| Main Authors: | Alezabi, Kamal Ali, Hashim, Fazirulhisyam, Hashim, Shaiful J., Ali, Borhanuddin M., Jamalipour, Abbas |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
SpringerOpen
2020
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/88751/ http://psasir.upm.edu.my/id/eprint/88751/1/5G.pdf |
Similar Items
An efficient authentication and key agreement protocol for 4G (LTE) networks
by: Alezabi, Kamal Ali, et al.
Published: (2014)
by: Alezabi, Kamal Ali, et al.
Published: (2014)
Authentication process enhancements in WiMAX networks
by: Alezabi, Kamal Ali, et al.
Published: (2016)
by: Alezabi, Kamal Ali, et al.
Published: (2016)
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
A new tunnelled EAP based authentication method for WiMAX networks
by: Alezabi, Kamal Ali Ahmed, et al.
Published: (2013)
by: Alezabi, Kamal Ali Ahmed, et al.
Published: (2013)
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
by: Khalid, Haqi, et al.
Published: (2023)
by: Khalid, Haqi, et al.
Published: (2023)
QoE-driven cross-layer downlink scheduling for heterogeneous traffics over 4G networks
by: Nasimi, Meysam, et al.
Published: (2017)
by: Nasimi, Meysam, et al.
Published: (2017)
An architecture of 5G based on SDN NV wireless network
by: Hashim, Fazirulhisyam, et al.
Published: (2019)
by: Hashim, Fazirulhisyam, et al.
Published: (2019)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
A survey of RFID authentication protocols
by: Yousuf, Y., et al.
Published: (2008)
by: Yousuf, Y., et al.
Published: (2008)
An authentication protocol for mobile cellular network
by: Mohammed, Lawan Ahmed, et al.
Published: (2002)
by: Mohammed, Lawan Ahmed, et al.
Published: (2002)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Openlab 5G bangunkan potensi 5G
by: Sinar Harian
Published: (2019)
by: Sinar Harian
Published: (2019)
Zero knowledge protocol network authentication and monitoring
by: Ang, Yong Seng
Published: (2024)
by: Ang, Yong Seng
Published: (2024)
Deployments Scenarios of 5G Networks
by: Oudah, Ali A.
Published: (2017)
by: Oudah, Ali A.
Published: (2017)
Road to 5g
by: Amri, Muhammad Hariz Adrian, et al.
Published: (2021)
by: Amri, Muhammad Hariz Adrian, et al.
Published: (2021)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
4G coverage in Malaysia
by: Ab Aziz, Nur Faizah, et al.
Published: (2015)
by: Ab Aziz, Nur Faizah, et al.
Published: (2015)
An enhancement of authentication and energy efficient clustering protocol for wireless sensor network / Ahmed Abdulhadi Jasim
by: Ahmed Abdulhadi , Jasim
Published: (2021)
by: Ahmed Abdulhadi , Jasim
Published: (2021)
Wireless Evolution: 1G To 4 G - An Assessment
by: Hooi, Peh Tiong
Published: (2002)
by: Hooi, Peh Tiong
Published: (2002)
A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
Telefon 4G
Published: (2008)
Published: (2008)
Maximum-largest weighted delay first algorithm for heterogeneous traffic in 4G networks
by: Elsheikh, Elsheikh Mohamed Ahmed, et al.
Published: (2018)
by: Elsheikh, Elsheikh Mohamed Ahmed, et al.
Published: (2018)
Vertical Fast Handoff Technique For Mobile IPv6 in Heterogeneous 4G Networks
by: Solouk, Vahid
Published: (2009)
by: Solouk, Vahid
Published: (2009)
Enhanced password-based authentication protocol / Lee Chee Kiam.
by: Lee, Chee Kiam
Published: (2000)
by: Lee, Chee Kiam
Published: (2000)
Effects of Authentication of Users in Mobile Internet Protocol Version 6
by: Obenofunde, Simon Tabi
Published: (2004)
by: Obenofunde, Simon Tabi
Published: (2004)
Deniable authentication protocol based on factoring and discrete logarithm problems
by: Nek Abd Rahman, Normahirah, et al.
Published: (2022)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2022)
Fast and secure handover authentication scheme in Mobile WiMax
by: Zmezm, Hamzah F., et al.
Published: (2014)
by: Zmezm, Hamzah F., et al.
Published: (2014)
Securing password authentication using MD5 algorithm
by: Siti Nabilah , Mohammad Zain
Published: (2014)
by: Siti Nabilah , Mohammad Zain
Published: (2014)
Poetics of Authenticity
by: Burenius, Axel
Published: (2023)
by: Burenius, Axel
Published: (2023)
Efficient beamforming and spectral efficiency maximization in a joint transmission system using an adaptive particle swarm optimization algorithm
by: Faisal, Ali Raed, et al.
Published: (2016)
by: Faisal, Ali Raed, et al.
Published: (2016)
Overload-state downlink resource scheduling and its challenges towards 5G networks
by: Ferdosian, Nasim, et al.
Published: (2016)
by: Ferdosian, Nasim, et al.
Published: (2016)
Advanced inter-cell interference management technologies in 5G wireless Heterogeneous Networks (HetNets)
by: Raisa, Farah, et al.
Published: (2017)
by: Raisa, Farah, et al.
Published: (2017)
A Comparative Study Of Reading Authentic And Non-Authentic Text
by: Zainal, Zaidah, et al.
Published: (2010)
by: Zainal, Zaidah, et al.
Published: (2010)
Illumination-invariant ear authentication
by: Jamil, Nursuriati, et al.
Published: (2014)
by: Jamil, Nursuriati, et al.
Published: (2014)
SELAMAT: a new secure and lightweight multi-factor authentication scheme for cross-platform industrial IoT systems
by: Khalid, Haqi, et al.
Published: (2021)
by: Khalid, Haqi, et al.
Published: (2021)
Terahertz communications for 5G and beyond
by: Ismail, Alyani, et al.
Published: (2018)
by: Ismail, Alyani, et al.
Published: (2018)
Moving forward with 5G technology
by: Rafidi, Rayyan
Published: (2020)
by: Rafidi, Rayyan
Published: (2020)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Similar Items
-
An efficient authentication and key agreement protocol for 4G (LTE) networks
by: Alezabi, Kamal Ali, et al.
Published: (2014) -
Authentication process enhancements in WiMAX networks
by: Alezabi, Kamal Ali, et al.
Published: (2016) -
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017) -
A new tunnelled EAP based authentication method for WiMAX networks
by: Alezabi, Kamal Ali Ahmed, et al.
Published: (2013) -
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)