2022
DOI: 10.1016/j.jnca.2022.103435
|View full text |Cite
|
Sign up to set email alerts
|

FastHand: A fast handover authentication protocol for densely deployed small-cell networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 40 publications
0
1
0
Order By: Relevance
“…This section presents the security features verification as mentioned in II-C. We conduct the informal as well as the formal (Syther and GNY logic) security verification to show the proposed protocol's robustness against the identified attacks. The research carried out in [28], [29] shows that [1] is vulnerable to various attacks such as confidentiality and MiTM. [1], [30] shows that [31] does not offer the perfect forward secrecy, no formal verification, and confidentiality.…”
Section: A Security Features Verificationmentioning
confidence: 99%
“…This section presents the security features verification as mentioned in II-C. We conduct the informal as well as the formal (Syther and GNY logic) security verification to show the proposed protocol's robustness against the identified attacks. The research carried out in [28], [29] shows that [1] is vulnerable to various attacks such as confidentiality and MiTM. [1], [30] shows that [31] does not offer the perfect forward secrecy, no formal verification, and confidentiality.…”
Section: A Security Features Verificationmentioning
confidence: 99%
“…Aiming at the problem that the authentication vector is not protected, Prasanta et al [12] used symmetric keys to protect the pre shared key and achieve forward security, but this protocol increases the cost of maintaining the key. Du et al [13] proposed that the identity and authentication messages are generated by a hash function to generate a group authentication message, which can avoid the plaintext transmission of the authentication vector, but this method does not solve the security of user identity authentication and key negotiation in the group.…”
Section: Introductionmentioning
confidence: 99%