IoT cybersecurity in 5G and beyond: a systematic literature review

S Pirbhulal, S Chockalingam, A Shukla… - International Journal of …, 2024 - Springer
Abstract The 5th generation (5G) and beyond use Internet of Things (IoT) to offer the feature
of remote monitoring for different applications such as transportation, healthcare, and …

Decentralized Edge Collaboration for Seamless Handover Authentication in Zero-Trust IoV

H Fang, Y Zhu, Y Zhang, X Wang - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Given the frequently changing and potentially unreliable environment, the seamless
handover authentication is essential to achieve zero-trust Internet of Vehicles (IoV) network …

Enhancing the 5G-AKA Protocol with Post-quantum Digital Signature Method

G Rossi Figlarz, F Passuelo Hessel - International Conference on …, 2024 - Springer
Data communicated in 5G is crucial to the operation of many areas in our society which are
under constant cyber-attacks. The Authenticated Key Agreement (5G-AKA) is a standardized …

[PDF][PDF] Loïc FERREIRA

R L'INSA - hal.science
The communication protocol LoRa, developed by Semtech company, aims at setting up a
Low-Power Wide-Area Network (LPWAN) based on a long-range, low-rate, wireless …

Integrity protection

V Torvinen, NB Henda, Q Chen, V Lehtovirta… - US Patent …, 2024 - Google Patents
A message authentication code, for a message transmitted and received over a
communications network, is formed by applying inputs to an integrity algorithm acting on the …