A tutorial on next generation heterogeneous IoT networks and node authentication

K Sood, S Yu, DDN Nguyen, Y Xiang… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
… This makes the authentication issue in heterogeneous networks a … NGN concept, its impact
(particularly on IoT node … solution to support IoT node authentication in vertical networks (we …

User authentication schemes with pseudonymity for ubiquitous sensor network in NGN

B Vaidya, JJ Rodrigues, JH Park - International Journal of …, 2010 - Wiley Online Library
… In this paper, we propose two user authentication protocols that are variations of a recent
strong-… nodes. In addition, we will propose user authentication schemes to satisfy the following …

Toward IoT node authentication mechanism in next generation networks

DDN Nguyen, K Sood, Y Xiang, L Gao… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
… based effective IoT authentication methodology to authenticate wireless IoT nodes in NG-IoT …
1) We propose an effective node authentication approach for the next generation 5G-IoT …

Fast Authentication during Handover in NGN

S Ganti, B Ambudkar - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
AUTHENTICATION DURING HANDOVERS IN NGN In NGN, a MN (Mobile Node) changes
their points of attachment to the network while moving. This change is called handover. In …

Security issues at NGN networks

Δ Τζουανόπουλος - 2012 - dione.lib.unipi.gr
… EAP - AKA provides mutual authentication in a network environment that integrates 3G and
… all Diameter nodes that support authentication and authorization services have to comply. …

Design and Robust Evaluation of Next Generation Node Authentication Approach

DDN Nguyen, K Sood, Y Xiang, L Gao… - … on Dependable and …, 2024 - ieeexplore.ieee.org
… To determine the node authentication time, we incorporated … versus the number of IoT
nodes. We evaluated the training … node authentication mechanism in next generation networks,…

A study of authentication method on fixed mobile convergence environments

M Matsumoto - Networks 2006. 12th International …, 2006 - ieeexplore.ieee.org
… and TISPAN NGN, respectively. This section describes these two authentication methods and
… We apply IRG as a proxy IMS registration node for nonISIM capable UE, and our proposed …

[PDF][PDF] Secure cross layer architecture for IOT devices in NGN

A Sethi, S Vijay, A Aeron - IJRTE, 2019 - researchgate.net
… Clusters are created to connect master node or client node using SSH and interfaces using
Authentication of the communication device is important phase and successful authentication

Secure identifier management based on blockchain technology in NDN environment

HK Yang, HJ Cha, YJ Song - Ieee Access, 2018 - ieeexplore.ieee.org
environments, NDN(Named Data Networking) networks attract attention as the next generation
network … of representative nodes, participating nodes and authentication servers. The …

Quality assurance in the IMS-based NGN environment

A Kos, M Volk, J Bester - … of research on wireless multimedia: Quality …, 2009 - igi-global.com
… However, the nature of the NGN environment presents several … have not existed in the legacy
environments (eg, multi-network… authentication and authorization mechanisms for the NGN