[HTML][HTML] Improved handover authentication in fifth-generation communication networks using fuzzy evolutionary optimisation with nanocore elements in mobile …

J Divakaran, SK Prashanth, GB Mohammad… - Journal of Healthcare …, 2022 - hindawi.com
Authentication is a suitable form of restricting the network from different types of attacks,
especially in case of fifth-generation telecommunication networks, especially in healthcare …

Machine learning protocol for secure 5G handovers

VO Nyangaresi, AJ Rodrigues, SO Abeka - International Journal of …, 2022 - Springer
The fifth generation (5G) networks are characterized with ultra-dense deployment of base
stations with limited footprint. Consequently, user equipment's handover frequently as they …

Efficient handover protocol for 5G and beyond networks

VO Nyangaresi, AJ Rodrigues - Computers & Security, 2022 - Elsevier
The fifth generation (5G) and beyond 5G (B5G) networks offer ultra-low latencies, higher
reliability, scalability, data rates and capacities to support applications such as vehicular …

Intelligent target cell selection algorithm for low latency 5G networks

VO Nyangaresi, MA Al Sibahee, ZA Abduljabbar… - … : Selected Papers from …, 2022 - Springer
Security and efficiency during the handover process are critical challenges in 5G
heterogeneous networks owing to its strict low latency and security requirements. The 5G …

Blockchain-based group authentication scheme for 6G communication network

M Soni, DK Singh - Physical Communication, 2023 - Elsevier
The ultimate objective in this period is to turn present technology into intelligent global
habitats that ease daily interactions. The emerging Industry 4.0 has provided exciting …

Fast user authentication in 5G heterogeneous networks using RLAC-FNN and blockchain technology for handoff delay reduction

SV Manjaragi, SV Saboji - Wireless Networks, 2023 - Springer
In the fifth generation (5G), ultra-dense heterogeneous network (UDHN) is considered as a
prominent technology to resolve network system problems. It is challenged to provide secure …

Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things

VO Nyangaresi, M Ahmad, A Alkhayyat… - Expert Systems, 2022 - Wiley Online Library
Driven by the requirements for entirely low communication latencies, high bandwidths,
reliability and capacities, the Fifth Generation (5G) networks has been deployed in a number …

ANN-FL secure handover protocol for 5G and beyond networks

VO Nyangaresi, AJ Rodrigues, SO Abeka - Towards new e-Infrastructure …, 2021 - Springer
Technical network challenges in 5G relates to handover authentication, user privacy
protection and resource management. Due to interoperability requirements among the …

Artificial Intelligence and Machine Learning in 5G Network Security: Opportunities, advantages, and future research trends

N Haider, MZ Baig, M Imran - arXiv preprint arXiv:2007.04490, 2020 - arxiv.org
Recent technological and architectural advancements in 5G networks have proven their
worth as the deployment has started over the world. Key performance elevating factor from …

Neuro-fuzzy based handover authentication protocol for ultra dense 5G networks

VO Nyangaresi, AJ Rodrigues… - 2020 2nd Global Power …, 2020 - ieeexplore.ieee.org
Smart grids improve the management of various power network components as well as the
monitoring of power flows. Their deployments require very fast communication channels …