A comprehensive survey on mobility management in 5G heterogeneous networks: Architectures, challenges and solutions

E Gures, I Shayea, A Alhammadi, M Ergen… - IEEE …, 2020 - ieeexplore.ieee.org
With the rapid increase in the number of mobile users, wireless access technologies are
evolving to provide mobile users with high data rates and support new applications that …

Survey on joint paradigm of 5G and SDN emerging mobile technologies: Architecture, security, challenges and research directions

SHA Kazmi, F Qamar, R Hassan, K Nisar… - Wireless Personal …, 2023 - Springer
Modern communication systems are probable to surface new challenges while introducing
innovative fronts concerning context consciousness in wireless networks. The main outcome …

Privacy protection and energy optimization for 5G-aided industrial Internet of Things

M Humayun, NZ Jhanjhi, M Alruwaili… - Ieee …, 2020 - ieeexplore.ieee.org
The 5G is expected to revolutionize every sector of life by providing interconnectivity of
everything everywhere at high speed. However, massively interconnected devices and fast …

A comprehensive survey on SDN and blockchain-based secure vehicular networks

IM Varma, N Kumar - Vehicular Communications, 2023 - Elsevier
Abstract Internet of Vehicles (IoV), as an emerging technology, has gained much attention in
recent years due to rapid advancements in computing paradigms, vehicular and wireless …

SliceBlock: context-aware authentication handover and secure network slicing using DAG-blockchain in edge-assisted SDN/NFV-6G environment

IH Abdulqadder, S Zhou - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Network slicing in a 6G environment is an important research area in the current years.
However, satisfying the demands of network slice requests is a challenging task. Energy …

[PDF][PDF] Deep learning enabled secure IoT handover authentication for blockchain networks

MM Salim, V Shanmuganathan, V Loia… - Human-centric Computing …, 2021 - hcisj.com
Blockchain is an emerging key technology for safeguarding telecommunications networks
against rogue base stations. Combining Internet of Things (IoT) devices with a decentralized …

An EAP-based mutual authentication protocol for WLAN-connected IoT devices

AK Yadav, M Misra, PK Pandey… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Several symmetric and asymmetric encryption based authentication protocols have been
developed for the wireless local area networks (WLANs). However, recent findings reveal …

The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G

IH Abdulqadder, D Zou, IT Aziz - Future Generation Computer Systems, 2023 - Elsevier
Software-defined networking (SDN) has increased the need for security due to the
participation of illegitimate packets resulting from poor processing times and inadequate …

CBACS: A privacy-preserving and efficient cache-based access control scheme for software defined vehicular networks

X Zhang, H Zhong, C Fan… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In vehicular networks, caching content in fog nodes is a widely accepted and favorable way
to quickly respond to massive vehicle requests, reduce content retrieval delay and improve …

FogHA: An efficient handover authentication for mobile devices in fog computing

Y Guo, Y Guo - Computers & Security, 2021 - Elsevier
Fog computing is a new distributed computing paradigm that extends cloud services to the
edge of the network, with features such as mobile support, location awareness, and low …