Is 5G handover secure and private? A survey

D Zhao, Z Yan, M Wang, P Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The next-generation mobile cellular communication and networking system (5G) is highly
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …

HashXor: A lightweight scheme for identity privacy of IoT devices in 5G mobile network

H Choudhury - Computer Networks, 2021 - Elsevier
Mobile networks are set to play a crucial role as backbone network in IoT deployments due
to their low cost, broad coverage, high bandwidth, and low latency. However, a challenging …

Robust lightweight privacy-preserving and session scheme interrogation for fog computing systems

BD Deebak, F Al-Turjman - Journal of Information Security and Applications, 2021 - Elsevier
Abstract Session Initiation Protocol (SIP) is a communication protocol of multimedia systems
providing IP signaling to initiate instant messaging. The rapid growth of wireless …

5G‐Core Network Security

I Ahmad, J Suomalainen, J Huusko - 2021 - ieeexplore.ieee.org
This chapter provides a brief overview of the security architecture of fifth generation (5G). It
also provides a brief description of the 5G core network (5GCN), and its design principles …

A novel variable K-pseudonym scheme applied to 5G anonymous access authentication

D Ma, X Lyu, R Zou - arXiv preprint arXiv:2106.07158, 2021 - arxiv.org
Anonymous access authentication schemes provide users with massive application services
while protecting the privacy of users' identities. The identity protection schemes in 3G and …

[引用][C] 5G 网络认证及密钥协商协议的安全性分析

贾凡, 严妍, 袁开国, 赵璐婧 - 2021 - 清华大学学报(自然科学版)