Secure Authentication Protocol for 5G Enabled IoT Network
暂无分享,去创建一个
Mohammad S. Obaidat | Deepak Puthal | Sanjay Saxena | Suraj Sharma | Shaswat Satapathy | Shivani Singh | Amiya Kumar Sahu
[1] Mohammad S. Obaidat,et al. Trust-enhanced message security protocol for mobile ad hoc networks , 2012, 2012 IEEE International Conference on Communications (ICC).
[2] Ian F. Akyildiz,et al. The evolution to 4G cellular systems: LTE-Advanced , 2010, Phys. Commun..
[3] Andreas Kunz,et al. Overview of 5G security in 3GPP , 2017, 2017 IEEE Conference on Standards for Communications and Networking (CSCN).
[4] Imran A. Zualkernan,et al. Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).
[5] Tin Yu Wu,et al. A Hash-Based Distributed Storage Strategy of FlowTables in SDN-IoT Networks , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[6] Xiaodong Lin,et al. Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT , 2018, IEEE Journal on Selected Areas in Communications.
[7] E. Monteiro,et al. Evaluation of Mobile Communications : From Voice Calls to Ubiquitous Multimedia Group Communications , 2004 .
[8] Geir M. Køien,et al. Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).
[9] P. Venkata Krishna,et al. CHSEO: An Energy Optimization Approach for Communication in the Internet of Things , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[10] Jong Hyuk Park,et al. User Experience and Quality-of-Service in Internet of Things: Practice and Trends , 2016, Wirel. Pers. Commun..
[11] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[12] Navid Nikaein,et al. Towards enforcing Network Slicing on RAN: Flexibility and Resources abstraction , 2017 .
[13] Alessandro Neri,et al. A federated architecture approach for Internet of Things security , 2014, 2014 Euro Med Telco Conference (EMTC).
[14] Xuemin Shen,et al. Enabling device-to-device communications in millimeter-wave 5G cellular networks , 2015, IEEE Communications Magazine.
[15] Gerhard P. Hancke,et al. A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges , 2018, IEEE Access.
[16] Jehad M. Hamamreh,et al. OFDM-Subcarrier Index Selection for Enhancing Security and Reliability of 5G URLLC Services , 2017, IEEE Access.
[17] Petar Popovski,et al. 5G Wireless Network Slicing for eMBB, URLLC, and mMTC: A Communication-Theoretic View , 2018, IEEE Access.
[18] Hong Wen,et al. 5G security architecture and light weight security authentication , 2015, 2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC).
[19] Honggang Zhang,et al. Network slicing as a service: enabling enterprises' own software-defined cellular networks , 2016, IEEE Communications Magazine.
[20] Cas J. F. Cremers,et al. Operational Semantics and Verification of Security Protocols , 2012, Information Security and Cryptography.
[21] Geng Wu,et al. An end-to-end network slicing framework for 5G wireless communication systems , 2016, ArXiv.
[22] Mohammad S. Obaidat,et al. TSCA: A Temporal-Spatial Real-Time Charging Scheduling Algorithm for On-Demand Architecture in Wireless Rechargeable Sensor Networks , 2018, IEEE Transactions on Mobile Computing.
[23] Muhammad Waseem,et al. A Critical Analysis on the Security Concerns of Internet of Things (IoT) , 2015 .