Sign Up to like & get
recommendations!
0
Published in 2020 at "Wireless Personal Communications"
DOI: 10.1007/s11277-020-07492-y
Abstract: A fast handover authentication protocol takes an important role for delay-sensitive applications in wireless networks. Mobile users may be granted different priorities depending on communication fees they paid. In this paper, we present a priority-aware…
read more here.
Keywords:
authentication protocol;
authentication;
priority aware;
protocol ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3168843
Abstract: Urban air mobility (UAM) is a future air transportation system to solve the air pollution and movement efficiency problems of the traditional mobility system. In UAM environments, unmanned aerial vehicles (UAV) are used to transport…
read more here.
Keywords:
authentication scheme;
handover authentication;
mobility;
air ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2019.2927664
Abstract: The evolving fifth generation (5G) cellular networks will be a collection of heterogeneous and backward-compatible networks. With the increased heterogeneity and densification of 5G heterogeneous networks (HetNets), it is important to ensure security and efficiency…
read more here.
Keywords:
robust universal;
authentication;
handover authentication;
seamless handover ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Intelligent Transportation Systems"
DOI: 10.1109/tits.2022.3221147
Abstract: In recent years, the world of vehicular communication is in full progress. With the emergence of the fifth-generation (5G) technology, the high bandwidth and low latency features in the 5G vehicle to everything (5G-V2X) network…
read more here.
Keywords:
authentication;
handover authentication;
efficient group;
group handover ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "Journal of Healthcare Engineering"
DOI: 10.1155/2022/2500377
Abstract: Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that…
read more here.
Keywords:
authentication;
handover authentication;
fuzzy evolutionary;
fifth generation ... See more keywords