Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges

M Faheem, SBH Shah, RA Butt, B Raza… - Computer Science …, 2018 - Elsevier
The fourth industrial revolution known as Industry 4.0 has paved the way for a systematical
deployment of the modernized power grid (PG) to manage continuously growing energy …

A new ticket-based authentication mechanism for fast handover in mesh network

YM Lai, PJ Cheng, CC Lee, CY Ku - PloS one, 2016 - journals.plos.org
Due to the ever-growing popularity mobile devices of various kinds have received
worldwide, the demands on large-scale wireless network infrastructure development and …

Privacy preservation with RTT‐based detection for wireless mesh networks

AK Roy, AK Khan - IET Information Security, 2020 - Wiley Online Library
Wireless mesh networks (WMNs) upraised as superior technology offering all aspects of
services as compared to conventional networks. Due to the absence of centralised authority …

User‐centric data communication service strategy for 5G vehicular networks

Y Zhou, Y Zhang - IET Communications, 2022 - Wiley Online Library
To solve the problems of unbalanced network loads, poor network throughput, and low user
transmission rate in 5th generation (5G) vehicular networks, a user‐centric data …

A relay-assisted secure handover mechanism for high-speed trains

Y Zhao, B Tian, Z Chen, J Yang, S Li - KSII Transactions on …, 2019 - koreascience.kr
Considering that the existing Long Term Evolution is not suitable for the fast and frequent
handovers of high-speed trains, this paper proposes a relay-assisted handover mechanism …

Blind key distribution mechanism to secure wireless metropolitan area network

SBM Baskaran, G Raja - CSI transactions on ICT, 2016 - Springer
Abstract IEEE 802.16, also known as WMAN is a promising broadband wireless technology
that provides a great support for Next Generation Networks (NGN). Due to the continuous …

Authentication process enhancements in WiMAX networks

KA Alezabi, F Hashim, SJ Hashim… - Security and …, 2016 - Wiley Online Library
Authentication is one of the most important security processes in Worldwide Interoperability
for Microwave Access (WiMAX) networks. This process allows the receiver (whether base …

Authentication protocol with privacy preservation for handover in wireless mesh networks

AK Roy, AK Khan - … for Computational Intelligence: Proceedings of ICTSCI …, 2020 - Springer
As we know that accessing the Internet through a mobile device is growing rapidly
worldwide. Therefore, a reliable and efficient authentication scheme for fast handover is …

SOA 环境中的跨域认证方案研究

郭晶晶, 马建峰, 郭鑫鑫, 张涛 - 网络与信息安全学报, 2016 - infocomm-journal.com
鉴于现在的网络越来越复杂, 其中, 用户数量大, 服务类型多, 安全机制不统一的特点决定了SOA
环境中异构多域的情况, 给出了一种基于模糊理论的信任管理方法, 并将该方法与证书转换服务 …

[PDF][PDF] Secure and Efficient Authentication Protocol for Power System Computer Networks.

C Li, H Cheung, C Yang - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
In this paper, we propose an efficient and secure Authentication Protocol for Power systems
(APP). The security analysis shows that APP is secure and resilient to various kinds of …