2022
DOI: 10.1016/j.cose.2021.102601
|View full text |Cite
|
Sign up to set email alerts
|

A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…72 Thus, Scyther tool has been incorporated to identify unreported weaknesses in IKEv1 and IKEv2, 74 unfold incorrect claims in ISO/IEC 11770-2:2008 and ISO/IEC 11770-3:2008, 75 and illustrate security attacks in ISO/IEC 9798 family. 76 Recently, Scyther tool has been utilized to analyze the security of authentication protocols designed for the Internet of Things, [77][78][79][80][81] 5th generation, [82][83][84][85][86] and wireless sensor network [87][88][89][90][91] architecture.…”
Section: Security Verification Using Scyther Toolmentioning
confidence: 99%
“…72 Thus, Scyther tool has been incorporated to identify unreported weaknesses in IKEv1 and IKEv2, 74 unfold incorrect claims in ISO/IEC 11770-2:2008 and ISO/IEC 11770-3:2008, 75 and illustrate security attacks in ISO/IEC 9798 family. 76 Recently, Scyther tool has been utilized to analyze the security of authentication protocols designed for the Internet of Things, [77][78][79][80][81] 5th generation, [82][83][84][85][86] and wireless sensor network [87][88][89][90][91] architecture.…”
Section: Security Verification Using Scyther Toolmentioning
confidence: 99%
“…The power consumption in these transitions is approximated, without losing generality, by their triangle geometrical format (see Fig. 3), leading to the 1/2 coefficient in (6).…”
Section: A Energy Consumptionmentioning
confidence: 99%
“…where PW b represents the power consumption of the benchmark scheme and is calculated using (6) with the values respective to the benchmark.…”
Section: Power Saving Factormentioning
confidence: 99%
“…In certain communication scenarios, such as high-speed trains, convoys, and buses, multiple MTC devices (MTCDs) may move from the coverage area of one base station to another. This occurrence is labeled as a "group handover", necessitating each MTCD to authenticate during the transition [1].…”
Section: Introductionmentioning
confidence: 99%