D He, S Zeadally, L Wu, H Wang - Computer Networks, 2017 - Elsevier
The handover authentication protocol plays an important role in mobile wireless networks where mobile devices often need to securely and seamlessly roam among different access …
Y Wang, Z Miao, L Jiao - IEEE Access, 2016 - ieeexplore.ieee.org
In the wake of the extensive application of the fourth generation system, investigations of new technologies have been moving ahead vigorously to embrace the next generation …
A Ozhelvaci, M Ma - 2018 IEEE international conference on …, 2018 - ieeexplore.ieee.org
5G is a new paradigm that brings new technologies to overcome the challenges of the next- generation wireless mobile network. Also, 5G is expected to supply fastest, most reliable …
T Ma, F Hu, M Ma - 2017 27th International Telecommunication …, 2017 - ieeexplore.ieee.org
The forthcoming fifth generation (5G) wireless network is envisioned as highly heterogeneous that can support future applications demanding seamless coverage, low …
H Fang, X Wang, L Hanzo - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Conventional authentication mechanisms routinely used for validating communication devices are facing significant challenges. This is mainly due to their reliance on …
The fifth generation (5G) cellular network provides users with high-quality services due to its high transmission rate and low latency. It will support Internet of Things (IoT) devices and …
Z Ren, X Li, Q Jiang, Q Cheng… - Security and …, 2021 - Wiley Online Library
In a 5G network‐sliced environment, mobility management introduces a new form of handover called inter‐slice handover among network slices. Users can change their slices …