2022
DOI: 10.1155/2022/2500377
|View full text |Cite
|
Sign up to set email alerts
|

Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications

Abstract: Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore techn… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…An evolutionary approach that utilizes the fuzzy model was developed by Divakaran et al [23] for handover regulation and key management to enhance authentication performance. Delays and complexities have been minimized when authenticating 5G networks based on nanocore technology.…”
Section: Related Workmentioning
confidence: 99%
“…An evolutionary approach that utilizes the fuzzy model was developed by Divakaran et al [23] for handover regulation and key management to enhance authentication performance. Delays and complexities have been minimized when authenticating 5G networks based on nanocore technology.…”
Section: Related Workmentioning
confidence: 99%
“…Fuzzy evolutionary model to improve transfer authentication was proposed in [23], where fuzzy logic used to provide the assignment and key management authentication performance in 5G networks based on nanocore technology. The proposed model aimed to minimize the complexity and delays during authentication in 5G networks and mitigated authentication attacks when it is trained properly with the related attack datasets.…”
Section: Authentication Of S-health Using 5g Networkmentioning
confidence: 99%
“…e major requirements of RHM systems are a variety of sensors and communication devices [64]. Widely used sensors are wearable sensors (wireless or external wearable sensors), vision-based sensors, body sensor networks (BSN), and communication devices are categorized into two types, i.e., short-range communication devices and long-range communication devices [65][66][67][68][69][70][71] as described in Tables 4 and 3, demonstrating various sensors used in healthcare applications for acquiring real-time data, and the complete range of all communication devices is also described in Table 5.…”
Section: Contrast Media and Molecular Imagingmentioning
confidence: 99%