2020
DOI: 10.1109/access.2020.2980213
|View full text |Cite
|
Sign up to set email alerts
|

Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems

Abstract: Recently, security and privacy issues in mobile communication systems became an enormous challenge due to the limited resources of mobile networks regarding communication overhead, computational cost, and battery power. 5G systems provide high performance and flexibility that can connect billion of objects through Heterogeneous Wireless Networks (HWN) concerning the Internet of Things (IoT). However, some of these security challenges can be addressed by using outsourced assistants such as Server-Aided Verifica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 42 publications
0
8
0
Order By: Relevance
“…It is seen from Table 3 and from Fig. 5 that, the proposed scheme for verification stage is efficient than the schemes Shen et al [44], and Ramadan et al [46]. It is also seen from Table 3 that the schemes He et al [45], and Zhang et al [47] are more efficient than the proposed SSS in this paper for verification stage.…”
Section: Comparison Anaysismentioning
confidence: 53%
See 3 more Smart Citations
“…It is seen from Table 3 and from Fig. 5 that, the proposed scheme for verification stage is efficient than the schemes Shen et al [44], and Ramadan et al [46]. It is also seen from Table 3 that the schemes He et al [45], and Zhang et al [47] are more efficient than the proposed SSS in this paper for verification stage.…”
Section: Comparison Anaysismentioning
confidence: 53%
“…It has seen from Table 3 that the proposed scheme is efficient in signing stage in comparison with He et al [45], and Zhang et al [47]. It has also seen from Table 3 that the schemes Shen et al [44], and Ramadan et al [46] performing better than the proposed scheme in signing stage. Fig.…”
Section: Comparison Anaysismentioning
confidence: 71%
See 2 more Smart Citations
“…These security systems solved the various specification problem and the applying problem partially. However, most of the existing system offers rule-based or signature-based attack detection that has difficulty in countering the new attack techniques that frequently occur [13]- [15].…”
Section: Introductionmentioning
confidence: 99%