2020
DOI: 10.1186/s13638-020-01702-8
|View full text |Cite
|
Sign up to set email alerts
|

Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks

Abstract: In the next-generation heterogeneous wireless networks, designing authentication protocols that meet the demand of mobile users/applications is a challenge. This paper proposes authentication and re-authentication protocols for 4G wireless networks, in particular, LTE-Advanced (LTE-A), WLAN, and WiMAX-Advanced (WiMAX-A) interworking architecture. The proposed protocols are applicable to 5G networks. With the consideration of the existing standard authentication protocols, a new set of authentication and re-aut… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 22 publications
0
10
0
Order By: Relevance
“…Now, it has become the central link of the Internet of Everything [4,5]. e rapid development of 5G technology promotes the development of the digital technology [6].…”
Section: Introductionmentioning
confidence: 99%
“…Now, it has become the central link of the Internet of Everything [4,5]. e rapid development of 5G technology promotes the development of the digital technology [6].…”
Section: Introductionmentioning
confidence: 99%
“…To address these problems includes a new approach to RFID and the design of electronic systems in terms of alternative materials, processes and functions. The researchers in [122] are proposing an innovative approach focused on developing a new low-cost inkjet printing platform with efficient diode integration for applications with optimized metallization traces and enhanced recognition capabilities. The method theoretically proposed can form the basis for the first generation of precise "smart" RFID devices.…”
Section: Benefit Of Greening Itmentioning
confidence: 99%
“…However, the increase in the size of group members and the heterogeneous network access caused by cross-domains have also brought new security challenges to the design of user identity authentication systems. A secure cross-domain group authentication key agreement protocol will establish a shared key for remote cross-domain group members, establish a secure cross-domain communication channel, ensure the confidentiality and integrity of cross-domain group communication data, and effectively prevents attackers from stealing, tampering, and forging communication data [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%