2016 IEEE Wireless Communications and Networking Conference 2016
DOI: 10.1109/wcnc.2016.7564916
|View full text |Cite
|
Sign up to set email alerts
|

Secure and efficient uniform handover scheme for LTE-A networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…The system is used to enable any two entities in the 5G network to verify their public keys which is an essential step for mutually authenticating each other without the need for involving HN [18]. As will be explained in the next section, our proposals are efficient and scalable because the HN is not involved due to the use of blockchain [19].…”
Section: ) When the Target Ap Receives The Handover Response Itmentioning
confidence: 99%
“…The system is used to enable any two entities in the 5G network to verify their public keys which is an essential step for mutually authenticating each other without the need for involving HN [18]. As will be explained in the next section, our proposals are efficient and scalable because the HN is not involved due to the use of blockchain [19].…”
Section: ) When the Target Ap Receives The Handover Response Itmentioning
confidence: 99%
“…Encryption based handovers help to protect the user data as well as the control information which is passed between the entities laying off from a zone of one entity and moving into the zone of other entity [146], [297], [298]. • Uniform: Such types of handovers authentication are more prominent in LTE and LTE-A networks as these can be used for all types of networks [299], [300]. This is one of the most suitable handovers procedures for smart M-IoT networks.…”
Section: Property-basedmentioning
confidence: 99%
“…However, even though this scheme simplified the process of authentication, it would cost much since more technologies related to cryptology are concerned with this process. Meanwhile, in order to erase the existence of AAA servers in the process of authentication, the scheme designed by Cai et al [21] and Haddad et al [22] was proposed based on the security context. By adopting this scheme, a predetermined alternative target AP should be selected, and authentication information should be sent to the target AP.…”
Section: Handover Authentication In the Mobile Communicationmentioning
confidence: 99%