Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things

VO Nyangaresi, M Ahmad, A Alkhayyat… - Expert Systems, 2022 - Wiley Online Library
Driven by the requirements for entirely low communication latencies, high bandwidths,
reliability and capacities, the Fifth Generation (5G) networks has been deployed in a number …

Target Tracking Area Selection and Handover Security in Cellular Networks: A Machine Learning Approach

VO Nyangaresi - Proceedings of Third International Conference on …, 2023 - Springer
Abstract The 3rd Generation Partnership Project (3GPP) has specified the 5G Authentication
and Key Agreement (5G AKA) protocol for handover authentication. However, this protocol is …

A formally validated authentication algorithm for secure message forwarding in smart home networks

VO Nyangaresi - SN Computer Science, 2022 - Springer
The many devices connected in smart homes increase the attack surfaces from which
adversaries can invade the network. In addition, majority of these smart devices have …

AI-assisted secure data transmission techniques for next-generation HetNets: A review

H Sharma, G Sharma, N Kumar - Computer Communications, 2023 - Elsevier
Abstract Heterogeneous Networks (HetNets) play an imperative role in enhancing the
quality-of-service (QoS) for end-users by increasing the spectral efficiency (SE) of the …

Efficient extreme gradient boosting based algorithm for QoS optimization in inter-radio access technology handoffs

MA Al Sibahee, J Ma, VO Nyangaresi… - … congress on human …, 2022 - ieeexplore.ieee.org
The deployment of many base stations within a small network coverage area can potentially
increase network capacities. However, this implies frequent handoffs as the users move …

An overview of artificial intelligence for 5G/6G wireless networks security

A Ahammadi, WH Hassan… - … Conference on Cyber …, 2022 - ieeexplore.ieee.org
Fifth-generation (5G) wireless technologies provide a higher capability for millions of
devices to be connected with low latency and high-speed transmission. However, having a …

MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones

ZA Abduljabbar, VO Nyangaresi, J Ma… - … Conference on Future …, 2022 - Springer
Unmanned aerial vehicles have been deployed for surveillance in highly sensitive domains
such as in the military. As such, the data exchanged between the operators and these aerial …

[PDF][PDF] A survey on security challenges in the current MANET routing protocols

FC Korir, W Cheruiyot - Global Journal of Engineering and …, 2022 - academia.edu
Wireless communication employs radio technology to facilitate data transmission without
any fixed infrastructures. A mobile ad hoc network is an example of this data transmission …

Intelligent target cell selection algorithm for low latency 5G networks

VO Nyangaresi, MA Al Sibahee, ZA Abduljabbar… - … : Selected Papers from …, 2022 - Springer
Security and efficiency during the handover process are critical challenges in 5G
heterogeneous networks owing to its strict low latency and security requirements. The 5G …

A comparative analysis of recurrent neural network and support vector machine for binary classification of spam short message service

D Odera, G Odiaga - World Journal of Advanced Engineering …, 2023 - mail.wjaets.com
Over the years, communication through Short Message Service (SMS) has been a primary
tool for mobile subscribers. SMS has varied applications in health, industry, finances …