5G wireless P2MP backhaul security protocol: an adaptive approach
暂无分享,去创建一个
Gaurav Choudhary | Ilsun You | Jiyoon Kim | Jaejun Heo | Daniel Gerbi Duguma | I. You | Gaurav Choudhary | Jiyoon Kim | Jae-Wook Heo
[1] Federica Verdini,et al. Real time indoor localization integrating a model based pedestrian dead reckoning on smartphone and BLE beacons , 2017, Journal of Ambient Intelligence and Humanized Computing.
[2] C. Mala,et al. Improved Group Key Agreement for Emergency Cognitive Radio Mobile Ad hoc Networks , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[3] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[4] Salimur Choudhury,et al. Scheduling RFID networks in the IoT and smart health era , 2019, J. Ambient Intell. Humaniz. Comput..
[5] Jari Arkko,et al. Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) , 2006, RFC.
[6] Quang Duong,et al. Ultra-dense Networks for 5G and Beyond , 2019 .
[7] C. Moler,et al. Advances in Cryptology , 2000, Lecture Notes in Computer Science.
[8] Cas J. F. Cremers,et al. Operational Semantics and Verification of Security Protocols , 2012, Information Security and Cryptography.
[9] Quang Duong. Physical Layer Security for Ultra-Dense Networks under Unreliable Backhaul Connection , 2019 .
[10] Mehdi Bennis,et al. Securing the backhaul for mobile and multi-homed femtocells , 2011, 2011 Future Network & Mobile Summit.
[11] Colin Boyd,et al. On a Limitation of BAN Logic , 1994, EUROCRYPT.
[12] Andrei V. Gurtov,et al. Novel secure VPN architectures for LTE backhaul networks , 2016, Secur. Commun. Networks.
[13] Dan Simon,et al. The EAP-TLS Authentication Protocol , 2008, RFC.
[14] Ilsun You,et al. Enhancing SVO Logic for Mobile IPv6 Security Protocols , 2011, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[15] I. Mesogit,et al. Fiber-Wireless Fronthaul/Backhaul Network Architectures for 5G , 2018, 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).
[16] Hannes Tschofenig,et al. The Extensible Authentication Protocol-Internet Key Exchange Protocol version 2 (EAP-IKEv2) Method , 2008, RFC.
[17] Symeon Chatzinotas,et al. Power and Flow Assignment for 5G Integrated Terrestrial-Satellite Backhaul Networks , 2019, 2019 IEEE Wireless Communications and Networking Conference (WCNC).
[18] Ilsun You,et al. Secure and Efficient Protocol for Route Optimization in PMIPv6-Based Smart Home IoT Networks , 2017, IEEE Access.
[19] Muhammad Ali Imran,et al. 5G Backhaul Challenges and Emerging Research Directions: A Survey , 2016, IEEE Access.
[20] Andrei Gurtov,et al. A Case Study on Security Issues in LTE Backhaul and Core Networks , 2014 .
[21] Fang-Yie Leu,et al. Secure and efficient protocol for fast handover in 5G mobile Xhaul networks , 2018, J. Netw. Comput. Appl..
[22] Mohamed-Slim Alouini,et al. FSO-Based Vertical Backhaul/Fronthaul Framework for 5G+ Wireless Networks , 2016, IEEE Communications Magazine.
[23] Michael D. Ernst,et al. Computer Aided Verification , 2016, Lecture Notes in Computer Science.
[24] Thomas Plantard,et al. Device Identification and Personal Data Attestation in Networks , 2018, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[25] Cas J. F. Cremers,et al. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.
[26] Paul E. Hoffman,et al. Internet Key Exchange Protocol Version 2 (IKEv2) , 2010, RFC.
[27] Pekka Nikander,et al. A Bound End-to-End Tunnel (BEET) mode for ESP , 2008 .
[28] Yi-Bing Lin,et al. Automatic Blocking Mechanism for Information Security with SDN , 2019, J. Internet Serv. Inf. Secur..
[29] Dong In Kim,et al. Wireless backhauling of 5G small cells: challenges and solution approaches , 2015, IEEE Wireless Communications.
[30] Catherine A. Meadows,et al. Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.
[31] Dan Simon,et al. PPP EAP TLS Authentication Protocol , 1999, RFC.
[32] J. van Leeuwen,et al. Foundations of Security Analysis and Design , 2001, Lecture Notes in Computer Science.
[33] P. Eronen. Network Working Group Ikev2 Mobility and Multihoming Protocol (mobike) , 2006 .
[34] Andrei V. Gurtov,et al. Secured VPN Models for LTE Backhaul Networks , 2012, 2012 IEEE Vehicular Technology Conference (VTC Fall).
[35] Vishal Sharma,et al. A Survey on the Security of Pervasive Online Social Networks (POSNs) , 2018, J. Internet Serv. Inf. Secur..
[36] Paul F. Syverson,et al. The Logic of Authentication Protocols , 2000, FOSAD.
[37] Vincent K. N. Lau,et al. Cost Efficiency Optimization of 5G Wireless Backhaul Networks , 2016, IEEE Transactions on Mobile Computing.
[38] Pekka Nikander,et al. Host Identity Protocol , 2005 .
[39] Pekka Nikander,et al. Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks , 2010, IEEE Communications Surveys & Tutorials.
[40] Yannick Chevalier,et al. A visual analytics approach for the cyber forensics based on different views of the network traffic , 2018, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[41] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[42] Ilsun You,et al. SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks , 2017, Comput. Networks.
[43] Vishal Sharma,et al. Security of 5G-Mobile Backhaul Networks: A Survey , 2018, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[44] Vishal Sharma,et al. A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks , 2019, 5G Enabled Secure Wireless Networks.
[45] Fadi Al-Turjman,et al. Quantifying Uncertainty in Internet of Medical Things and Big-Data Services Using Intelligence and Deep Learning , 2019, IEEE Access.