An all-inclusive taxonomy and critical review of blockchain-assisted authentication and session key generation protocols for IoT

A Shahidinejad, J Abawajy - ACM Computing Surveys, 2024 - dl.acm.org
Authentication and Session Key Generation Protocols (SKGPs) play an essential role in
securing the communication channels of connected Internet of Things (IoT) devices …

[HTML][HTML] Achieving cybersecurity in blockchain-based systems: A survey

M Gimenez-Aguilar, JM De Fuentes… - Future Generation …, 2021 - Elsevier
With the increase in connectivity, the popularization of cloud services, and the rise of the
Internet of Things (IoT), decentralized approaches for trust management are gaining …

[PDF][PDF] 5G based Blockchain network for authentic and ethical keyword search engine.

M Poongodi, M Malviya, M Hamdi, V Vijayakumar… - IET …, 2022 - researchgate.net
The evolution of 4G telecommunication propagated various resource-crunched clients to
experience rate-effective resources at ease. However, it extends its underlying centralised …

Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things

VO Nyangaresi, M Ahmad, A Alkhayyat… - Expert Systems, 2022 - Wiley Online Library
Driven by the requirements for entirely low communication latencies, high bandwidths,
reliability and capacities, the Fifth Generation (5G) networks has been deployed in a number …

Security concepts in emerging 6G communication: Threats, countermeasures, authentication techniques and research directions

SHA Kazmi, R Hassan, F Qamar, K Nisar, AAA Ibrahim - Symmetry, 2023 - mdpi.com
Challenges faced in network security have significantly steered the deployment timeline of
Fifth Generation (5G) communication at a global level; therefore, research in Sixth …

An improved and provably secure symmetric-key based 5G-AKA Protocol

AK Yadav, M Misra, PK Pandey, A Braeken… - Computer Networks, 2022 - Elsevier
One of the primary authentication mechanisms defined for the 5G system is the 5G-
Authentication and Key Agreement (5G-AKA) protocol. It is set to be used in the next …

[PDF][PDF] A Formally Verified Authentication Scheme for mmWave Heterogeneous Networks

VO Nyangaresi - the 6th International Conference on Combinatorics …, 2021 - i4c.iust.ac.ir
The 5G mmWave networks support massive number of devices and offer salient features
such as very low communication latencies and high signal stability. This has seen these …

A new authentication and key agreement protocol for 5G wireless networks

T Liu, F Wu, X Li, C Chen - Telecommunication Systems, 2021 - Springer
Authentication and key agreement (AKA) protocol is an important security mechanism for
access services in mobile communication systems. The 3GPP group has standardized the …

Blockchain-based route selection with allocation of radio and computing resources for connected autonomous vehicles

M Vološin, E Šlapak, Z Becvar… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
With the advent of connected and autonomous vehicles (CAVs), we observe a growing need
for new resource allocation solutions in mobile networks. Currently, most of the resource …

A provably secure ecc-based multi-factor 5g-aka authentication protocol

AK Yadav, M Misra, PK Pandey, K Kaur… - … 2022-2022 IEEE …, 2022 - ieeexplore.ieee.org
Due to the constant penetration of various security attacks, it is highly important to secure the
underlying communication networks between the IoT, Fog and Cloud in the next generation …