Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

MA Ferrag, L Maglaras, A Argyriou, D Kosmanos… - Journal of Network and …, 2018 - Elsevier
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …

Integrating LPWAN technologies in the 5G ecosystem: A survey on security challenges and solutions

J Sanchez-Gomez, DG Carrillo, R Sanchez-Iborra… - IEEE …, 2020 - ieeexplore.ieee.org
The convergence of the Internet of Things (IoT) and 5G will open a range of opportunities for
the deployment of enhanced sensing, actuating and interactive systems as well as the …

[图书][B] LTE security

D Forsberg, G Horn, WD Moeller, V Niemi - 2012 - books.google.com
A concise, updated guide to the 3GPP LTE Security Standardization specifications A
welcome Revised Edition of the successful LTE Security addressing the security architecture …

A survey of Ethernet LAN security

T Kiravuo, M Sarela, J Manner - IEEE Communications Surveys …, 2013 - ieeexplore.ieee.org
Ethernet is the survivor of the LAN wars. It is hard to find an IP packet that has not passed
over an Ethernet segment. One important reason for this is Ethernet's simplicity and ease of …

[HTML][HTML] Enabling virtual AAA management in SDN-based IoT networks

A Molina Zarca, D Garcia-Carrillo, J Bernal Bernabe… - Sensors, 2019 - mdpi.com
The increase of Software Defined Networks (SDN) and Network Function Virtualization
(NFV) technologies is bringing many security management benefits that can be exploited at …

Low-power IoT communication security: On the performance of DTLS and TLS 1.3

G Restuccia, H Tschofenig… - 2020 9th IFIP International …, 2020 - ieeexplore.ieee.org
Similarly to elsewhere on the Internet, practical security in the Internet of Things (IoT) is
achieved by combining an array of mechanisms, at work at all layers of the protocol stack, in …

An effective non-commutative encryption approach with optimized genetic algorithm for ensuring data protection in cloud computing

SJ Nirmal Kumar, S Ravimaran… - Computer Modeling in …, 2020 - ingentaconnect.com
Nowadays, succeeding safe communication and protection-sensitive data from
unauthorized access above public networks are the main worries in cloud servers. Hence, to …

Method and system for providing access-specific key

R Falk, G Horn, D Kröselberg - US Patent 9,197,615, 2015 - Google Patents
An access specific key is provided for securing of a data transfer between a mobile terminal
and a node of an access net. For authentication of the mobile terminal, a authentication …

Methods, media, and devices for moving a connection from one point of access to another point of access

AG Forte, HG Schulzrinne - US Patent 8,750,242, 2014 - Google Patents
US8750242B2 - Methods, media, and devices for moving a connection from one point of access
to another point of access - Google Patents US8750242B2 - Methods, media, and devices for …

Defining the behavior of IoT devices through the mud standard: Review, challenges, and research directions

JL Hernández-Ramos, SN Matheu, A Feraudo… - IEEE …, 2021 - ieeexplore.ieee.org
With the strong development of the Internet of Things (IoT), the definition of IoT devices'
intended behavior is key for an effective detection of potential cybersecurity attacks and …