A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions

AS Khan, MA Sattar, K Nisar, AAA Ibrahim, NB Annuar… - Applied Sciences, 2022 - mdpi.com
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review

J Asim, AS Khan, RM Saqib, J Abdullah, Z Ahmad… - Applied Sciences, 2022 - mdpi.com
There are continued advances in the internet and communication fields regarding the
deployment of 5G-based applications. It is expected that by 2030, 6G applications will …

Lightweight multifactor authentication scheme for nextgen cellular networks

AS Khan, Y Javed, RM Saqib, Z Ahmad… - IEEE …, 2022 - ieeexplore.ieee.org
With increased interest in 6G (6th Generation) cellular networks that can support intelligently
small-cell communication will result in effective device-to-device (D2D) communication. High …

IoT networks: Security vulnerabilities of application layer protocols

M Lalit, SK Chawla, AK Rana, K Nisar… - … and Statistics (MACS …, 2022 - ieeexplore.ieee.org
Enabling objects to work intelligently through various communication technologies is a
common phenomenon. Objects become intelligent and are allowed to work autonomously …

S-ADS: spectrogram image-based anomaly detection system for IoT networks

Z Ahmad, AS Khan, S Aqeel, AA Julaihi… - 2022 Applied …, 2022 - ieeexplore.ieee.org
The Internet of things (IoT) is the smart concept of connecting devices equipped with various
sensors, actuators, memory, computational and communicational capabilities using the …

Employing public key infrastructure to encapsulate messages during transport layer security handshake procedure

NA Khan, AS Khan, HA Kar, Z Ahmad… - 2022 Applied …, 2022 - ieeexplore.ieee.org
The Transport Layer ensures that data is sent transparently between end-users while also
enabling reliable data transfer services to the higher levels. Cryptographic protocols Secure …

A survey on 802.11 MAC industrial standards, architecture, supporting emergency traffic and security: Future directions

SK Memon, M Hanafi Ahmad Hijazi, K Nisar… - Journal of Industrial …, 2022 - ray.yorksj.ac.uk
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

Anonymity preserving secure authentication for a transparent internet voting process

KF Rafat - 2022 International Conference on Cyber Warfare …, 2022 - ieeexplore.ieee.org
The COVID'19 pandemic of recent times has changed the trends of socializing, that is, from
physical to online (virtual) presence. Likewise, remote or work-from-home culture has …

A Survey on 6G Enabled Light Weight Authentication Protocol for UAVs, Security, Open Research Issues and Future Directions

A Shahid Khan, M Ali Sattar, K Nisar, AAA Ibrahim… - Applied …, 2022 - ray.yorksj.ac.uk
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

Conceptual review of DoS attacks in software defined networks

N Nisa, AS Khan, Z Ahmad, S Aqeel… - 2022 Applied …, 2022 - ieeexplore.ieee.org
Software-defined networking (SDN) is a new developing technology that has been widely
adopted by businesses because of its low cost and greater innovation in networks specially …