Applications of blockchain in unmanned aerial vehicles: A review

T Alladi, V Chamola, N Sahu, M Guizani - Vehicular Communications, 2020 - Elsevier
The recent advancement in Unmanned Aerial Vehicles (UAVs) in terms of manufacturing
processes, and communication and networking technology has led to a rise in their usage in …

A tutorial survey on vehicular communication state of the art, and future research directions

PK Singh, SK Nandi, S Nandi - Vehicular Communications, 2019 - Elsevier
Vehicular communication enables a variety of safety, infotainment, mobility, and
environmental applications. Vehicular communication is one of the leading research areas …

Mobility management issues and solutions in 5G-and-beyond networks: A comprehensive review

MUA Siddiqui, F Qamar, M Tayyab, MN Hindia… - Electronics, 2022 - mdpi.com
The fully accomplished standardization of the new mobile generation has led to the
deployment of fifth-generation (5G) wireless networks to gratify enormous traffic volume for …

Security in 5G and beyond recent advances and future challenges

F Salahdine, T Han, N Zhang - Security and Privacy, 2023 - Wiley Online Library
Abstract 5G, 6G, and beyond (xG) technologies aim at delivering emerging services with
new requirements and challenges, enabling full and hyper mobile connectivity over the …

Ml-based 5g network slicing security: A comprehensive survey

R Dangi, A Jadhav, G Choudhary, N Dragoni… - Future Internet, 2022 - mdpi.com
Fifth-generation networks efficiently support and fulfill the demands of mobile broadband
and communication services. There has been a continuing advancement from 4G to 5G …

Robust and universal seamless handover authentication in 5G HetNets

Y Zhang, RH Deng, E Bertino… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The evolving fifth generation (5G) cellular networks will be a collection of heterogeneous
and backward-compatible networks. With the increased heterogeneity and densification of …

Security, privacy and trust for smart mobile-Internet of Things (M-IoT): A survey

V Sharma, I You, K Andersson, F Palmieri… - IEEE …, 2020 - ieeexplore.ieee.org
With an enormous range of applications, the Internet of Things (IoT) has magnetized
industries and academicians from everywhere. IoT facilitates operations through ubiquitous …

Target Tracking Area Selection and Handover Security in Cellular Networks: A Machine Learning Approach

VO Nyangaresi - Proceedings of Third International Conference on …, 2023 - Springer
Abstract The 3rd Generation Partnership Project (3GPP) has specified the 5G Authentication
and Key Agreement (5G AKA) protocol for handover authentication. However, this protocol is …

A security protocol for route optimization in DMM-based smart home IoT networks

D Shin, K Yun, J Kim, PV Astillo, JN Kim, I You - IEEE Access, 2019 - ieeexplore.ieee.org
Smart home networks have been recognized as one of its representative important
applications in the forthcoming 5G era. It is also expected that in 5G networks, future smart …

LoRaWAN-based energy-efficient surveillance by drones for intelligent transportation systems

V Sharma, I You, G Pau, M Collotta, JD Lim, JN Kim - Energies, 2018 - mdpi.com
Urban networks aim at facilitating users for better experience and services through smart
platforms such as the Intelligent Transportation System (ITS). ITS focuses on information …