2021 IEEE 2nd International Conference on Signal, Control and Communication (SCC) 2021
DOI: 10.1109/scc53769.2021.9768338
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and Key Agreement Protocol for Secure Traffic Signaling in 5G Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 34 publications
0
11
0
Order By: Relevance
“…Similarly, a trust based system is developed in [100] for black-hole attack prevention. However, this approach increases the computational overhead [101] and may lead to resource unavailability. Although the scheme in [102] results in the reduction of energy, security and privacy issues are never considered.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, a trust based system is developed in [100] for black-hole attack prevention. However, this approach increases the computational overhead [101] and may lead to resource unavailability. Although the scheme in [102] results in the reduction of energy, security and privacy issues are never considered.…”
Section: Related Workmentioning
confidence: 99%
“…Although the scheme in [125] can alleviate side-channeling attacks, it cannot defend against user impersonation and password guessing attacks [133]. To address password guessing and impersonation attacks [134], physiological and behavioral biometric authentication schemes have been presented in [135], [136], [137], [138], [139], [140], [141], [142], [143]. However, physiological biometrics based authentications using iris recognition, face locks and fingerprint scans can be duplicated and changed.…”
Section: Related Workmentioning
confidence: 99%
“…This is a serious attack since an adversary can make several requests commanding actuators to repeat the task of pumping drugs to patients, leading to overdose. To address this issue, the scheme developed in [17] can be deployed. In addition, the scheme in [18] that is based on Elliptic Curve Cryptography (ECC) can also be utilized.…”
Section: Related Workmentioning
confidence: 99%