Analysis and design of an efficient handoff management strategy via velocity estimation in HetNets

R Tiwari, S Deshmukh - Transactions on Emerging …, 2022 - Wiley Online Library
In this paper, we present an efficient handoff decision strategy and a mobility state detection
(MSD) scheme for heterogeneous networks (HetNets). Due to base station (BS) …

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography

D He, S Zeadally, L Wu, H Wang - Computer Networks, 2017 - Elsevier
The handover authentication protocol plays an important role in mobile wireless networks
where mobile devices often need to securely and seamlessly roam among different access …

Safeguarding the ultra-dense networks with the aid of physical layer security: A review and a case study

Y Wang, Z Miao, L Jiao - IEEE Access, 2016 - ieeexplore.ieee.org
In the wake of the extensive application of the fourth generation system, investigations of
new technologies have been moving ahead vigorously to embrace the next generation …

Secure and efficient vertical handover authentication for 5G HetNets

A Ozhelvaci, M Ma - 2018 IEEE international conference on …, 2018 - ieeexplore.ieee.org
5G is a new paradigm that brings new technologies to overcome the challenges of the next-
generation wireless mobile network. Also, 5G is expected to supply fastest, most reliable …

Fast and efficient physical layer authentication for 5G HetNet handover

T Ma, F Hu, M Ma - 2017 27th International Telecommunication …, 2017 - ieeexplore.ieee.org
The forthcoming fifth generation (5G) wireless network is envisioned as highly
heterogeneous that can support future applications demanding seamless coverage, low …

Adaptive trust management for soft authentication and progressive authorization relying on physical layer attributes

H Fang, X Wang, L Hanzo - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Conventional authentication mechanisms routinely used for validating communication
devices are facing significant challenges. This is mainly due to their reliance on …

Secure and efficient AKA scheme and uniform handover protocol for 5G network using blockchain

Z Haddad, M Baza, MMEA Mahmoud… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
The fifth generation (5G) cellular network provides users with high-quality services due to its
high transmission rate and low latency. It will support Internet of Things (IoT) devices and …

Fast and Universal Inter‐Slice Handover Authentication with Privacy Protection in 5G Network

Z Ren, X Li, Q Jiang, Q Cheng… - Security and …, 2021 - Wiley Online Library
In a 5G network‐sliced environment, mobility management introduces a new form of
handover called inter‐slice handover among network slices. Users can change their slices …

[HTML][HTML] 5G 网络空间安全对抗博弈

徐瑨, 吴慧慈, 陶小峰 - 电子与信息学报, 2020 - jeit.ac.cn
随着移动通信技术的快速发展和第5 代移动通信(5G) 网络的商用, 网络空间安全问题日益凸显.
该文针对5G 网络空间安全中对抗博弈问题进行探讨, 从静态博弈, 动态博弈 …

基于SDN 的5G 移动通信网络架构.

柴蓉, 胡恂, 李海鹏, 蒋桂香 - Journal of Chongqing …, 2015 - search.ebscohost.com
移动互联业务的持H 增长K 及物联网等各类通信应用的广泛普及对移动通信%
统的功能和性能提i 了新的d 战. 第5 代(5G) 移动通信% 统基于对已有通信技木的融合及演进 …