A Survey on Security Aspects for 3GPP 5G Networks
暂无分享,去创建一个
Hui Li | Jin Cao | Ruhui Ma | Maode Ma | Lihui Xiong | Pu Yu | Yunqing Sun | Hui Li | M. Ma | Ruhui Ma | Jin Cao | Yunqing Sun | Pu Yu | Lihui Xiong
[1] Yukihiko Okumura,et al. Cell selection scheme for handover reduction based on moving direction and velocity of UEs for 5G multi-layered radio access networks , 2018, 2018 International Conference on Information Networking (ICOIN).
[2] Jing Yang,et al. A physical-layer authentication scheme based on hash method , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).
[3] Min Zuo,et al. Toward a Secure Access to 5G Network , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[4] Maode Ma,et al. A Secure and Efficient Message Authentication Scheme for Vehicular Networks based on LTE-V , 2018, KSII Trans. Internet Inf. Syst..
[5] Jin Cao,et al. EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks , 2018, J. Netw. Comput. Appl..
[6] Jere Backman,et al. Blockchain network slice broker in 5G: Slice leasing in factory of the future use case , 2017, 2017 Internet of Things Business Models, Users, and Networks.
[7] Dong Min Kim,et al. An Enhanced Access Reservation Protocol With a Partial Preamble Transmission Mechanism in NB-IoT Systems , 2017, IEEE Communications Letters.
[8] Antonios Argyriou,et al. Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes , 2017, J. Netw. Comput. Appl..
[9] Po-Kai Huang,et al. Energy efficient and scalable device-to-device discovery protocol with fast discovery , 2013, 2013 IEEE International Conference on Sensing, Communications and Networking (SECON).
[10] William Whyte,et al. A Security Credential Management System for V2X Communications , 2018, IEEE Transactions on Intelligent Transportation Systems.
[11] Elisa Bertino,et al. Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information , 2019, NDSS.
[12] Jin Cao,et al. Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network , 2019, IEEE Internet of Things Journal.
[13] Xiaodong Lin,et al. A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing , 2017, IEEE Internet of Things Journal.
[14] Aiqing Zhang,et al. Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems , 2017, IEEE Transactions on Information Forensics and Security.
[15] Mujahid Muhammad,et al. Survey on existing authentication issues for cellular-assisted V2X communication , 2018, Veh. Commun..
[16] Younghwan Yoo,et al. Handover cell selection using user mobility information in a 5G SDN-based network , 2017, 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).
[17] Yinghui Zhang,et al. Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks , 2017, Mob. Inf. Syst..
[18] Hong Wen,et al. Physical Layer Security Assisted 5G Network Security , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).
[19] Bharat K. Bhargava,et al. Adaptable Safety and Security in V2X Systems , 2017, 2017 IEEE International Congress on Internet of Things (ICIOT).
[20] Aleksandr Ometov,et al. Multi-factor authentication: A survey and challenges in V2X applications , 2017, 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).
[21] Gaoxiang Zhang,et al. Security in Use Cases of Vehicle-to-Everything Communications , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).
[22] Maode Ma,et al. An Anonymous Handover Authentication Scheme Based on LTE-A for Vehicular Networks , 2018, Wirel. Commun. Mob. Comput..
[23] Walid Abdallah,et al. Access control in 5G communication networks using simple PKI certificates , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[24] Rose Qingyang Hu,et al. Security for 5G Mobile Wireless Networks , 2018, IEEE Access.
[25] Günther Horn,et al. Towards 5G Security , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[26] Paul G. Spirakis,et al. Elliptic Curve Based Zero Knowledge Proofs and their Applicability on Resource Constrained Devices , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[27] Weidang Lu,et al. Small-Cell Assisted Secure Traffic Offloading for Narrowband Internet of Thing (NB-IoT) Systems , 2018, IEEE Internet of Things Journal.
[28] Gaurang Naik,et al. Coexistence of Wireless Technologies in the 5 GHz Bands: A Survey of Existing Solutions and a Roadmap for Future Research , 2018, IEEE Communications Surveys & Tutorials.
[29] Amita Jain,et al. 5G: Evolution of a secure mobile technology , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[30] Noël Crespi,et al. Securing authentication for mobile networks, a survey on 4G issues and 5G answers , 2018, 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN).
[31] Valentin Rakovic,et al. Visions Towards 5G: Technical Requirements and Potential Enablers , 2016, Wirel. Pers. Commun..
[32] Arnaud Kaiser,et al. On the Performance Evaluation of Vehicular PKI Protocol for V2X Communications Security , 2017, 2017 IEEE 86th Vehicular Technology Conference (VTC-Fall).
[33] Riri Fitri Sari,et al. Optimization of Random Access Channel in NB-IoT , 2018, IEEE Internet of Things Journal.
[34] Victor C. M. Leung,et al. Improving handover of 5G networks by network function virtualization and fog computing , 2017, 2017 IEEE/CIC International Conference on Communications in China (ICCC).
[35] Yuefeng Ji,et al. Blockchain-based trusted authentication in cloud radio over fiber network for 5G , 2017, 2017 16th International Conference on Optical Communications and Networks (ICOCN).
[36] Hong Wen,et al. 5G security architecture and light weight security authentication , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).
[37] Georges Kaddoum,et al. Cross-Layer Authentication Protocol Design for Ultra-Dense 5G HetNets , 2018, 2018 IEEE International Conference on Communications (ICC).
[38] James Gross,et al. On the Impact of Feature-Based Physical Layer Authentication on Network Delay Performance , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[39] Jari Arkko,et al. A USIM Compatible 5G AKA Protocol with Perfect Forward Secrecy , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[40] Gaoxiang Zhang,et al. Toward Secure Crowd Sensing in Vehicle-to-Everything Networks , 2018, IEEE Network.
[41] Jianfeng Ma,et al. An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy , 2017, J. Inf. Sci. Eng..
[42] Zhiguo Ding,et al. Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications , 2015, IET Commun..
[43] Xiaodong Lin,et al. Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT , 2018, IEEE Journal on Selected Areas in Communications.
[44] Mi Wen,et al. Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks , 2016, IEEE Internet of Things Journal.
[45] Jose Ordonez-Lucena,et al. Network Slicing for 5G with SDN/NFV: Concepts, Architectures, and Challenges , 2017, IEEE Communications Magazine.
[46] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[47] Qinglei Kong,et al. Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks , 2017, IEEE Internet of Things Journal.
[48] Xianbin Wang,et al. Fast authentication in 5G HetNet through SDN enabled weighted secure-context-information transfer , 2016, 2016 IEEE International Conference on Communications (ICC).
[49] Shantanu Sharma,et al. A survey on 5G: The next generation of mobile communication , 2015, Phys. Commun..
[50] Tony Q. S. Quek,et al. GRAAD: Group Anonymous and Accountable D2D Communication in Mobile Networks , 2017, IEEE Transactions on Information Forensics and Security.
[51] Yinghui Zhang,et al. Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice , 2018, J. Netw. Comput. Appl..
[52] Bin Han,et al. Network Slicing to Enable Scalability and Flexibility in 5G Mobile Networks , 2017, IEEE Communications Magazine.
[53] Zhichao Cao,et al. GeneWave: Fast authentication and key agreement on commodity mobile devices , 2017, 2017 IEEE 25th International Conference on Network Protocols (ICNP).
[54] Peter Schneider,et al. Providing strong 5G mobile network slice isolation for highly sensitive third-party services , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).
[55] Sami Tabbane,et al. A novel green handover self-optimization algorithm for LTE-A / 5G HetNets , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).
[56] Ralf Sasse,et al. A Formal Analysis of 5G Authentication , 2018, CCS.
[57] Xiaodong Lin,et al. Anonymous Group Message Authentication Protocol for LTE-based V2X Communications , 2018, Internet Technol. Lett..
[58] Valtteri Niemi,et al. UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications , 2017, Mob. Networks Appl..
[59] Steve A. Schneider,et al. Formal Analysis of V2X Revocation Protocols , 2017, STM.
[60] Jin Cao,et al. UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks , 2018, Secur. Commun. Networks.
[61] Frank Barickman,et al. Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO , 2018, 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[62] Xianbin Wang,et al. Authentication handover and privacy protection in 5G hetnets using software-defined networking , 2015, IEEE Communications Magazine.
[63] Jin Cao,et al. GBAAM: group-based access authentication for MTC in LTE networks , 2015, Secur. Commun. Networks.
[64] Hui Fang,et al. Unified Security Architecture Research for 5G Wireless System , 2014, 2014 11th Web Information System and Application Conference.
[65] Ilsun You,et al. Mitigating DoS Attacks Against Pseudonymous Authentication Through Puzzle-Based Co-Authentication in 5G-VANET , 2018, IEEE Access.
[66] Jin Cao,et al. GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[67] Jin Cao,et al. G2RHA:Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks , 2017, IEEE Transactions on Vehicular Technology.
[68] Hung-Yu Wei,et al. Bio-Inspired Proximity Discovery and Synchronization for D2D Communications , 2013, IEEE Communications Letters.
[69] Kazi J. Ahmed,et al. Secure LTE-Based V2X Service , 2018, IEEE Internet of Things Journal.
[70] Kim-Kwang Raymond Choo,et al. V2X security: A case study of anonymous authentication , 2017, Pervasive Mob. Comput..
[71] Zheng Yan,et al. Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications , 2018, IEEE Transactions on Industrial Informatics.
[72] Xin Li,et al. Network Slicing for 5G: Challenges and Opportunities , 2017, IEEE Internet Computing.
[73] Vuk Marojevic. C-V2X Security Requirements and Procedures: Survey and Research Directions , 2018, ArXiv.
[74] Maode Ma,et al. Fast and efficient physical layer authentication for 5G HetNet handover , 2017, 2017 27th International Telecommunication Networks and Applications Conference (ITNAC).
[75] Chuan Ma,et al. Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.
[76] Xuemin Shen,et al. LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[77] Jin Cao,et al. UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[78] Yinghui Zhang,et al. PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice , 2017, 2017 International Conference on Networking and Network Applications (NaNA).
[79] Wolfgang Kiess,et al. Service-Based Slice Selection Function for 5G , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[80] Wei You,et al. 5G network slice security trust degree calculation model , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).
[81] Jin Cao,et al. A Survey on Security Aspects for LTE and LTE-A Networks , 2014, IEEE Communications Surveys & Tutorials.