Intelligent zero trust architecture for 5G/6G networks: Principles, challenges, and the role of machine learning in the context of O-RAN

K Ramezanpour, J Jagannath - Computer Networks, 2022 - Elsevier
In this position paper, we discuss the critical need for integrating zero trust (ZT) principles
into next-generation communication networks (5G/6G). We highlight the challenges and …

Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI and MTD Approaches to Security Solutions

AH Abdi, L Audah, A Salh, MA Alhartomi… - IEEE …, 2024 - ieeexplore.ieee.org
Software-Defined Networking (SDN) is a groundbreaking technology that has transformed
network management significantly. By integrating data and control, SDN offers unparalleled …

A comprehensive, formal and automated analysis of the {EDHOC} protocol

C Jacomme, E Klein, S Kremer… - 32nd USENIX Security …, 2023 - usenix.org
EDHOC is a key exchange proposed by IETF's Lightweight Authenticated Key Exchange
(LAKE) Working Group (WG). Its design focuses on small message sizes to be suitable for …

Provable security analysis of FIDO2

M Barbosa, A Boldyreva, S Chen… - Advances in Cryptology …, 2021 - Springer
We carry out the first provable security analysis of the new FIDO2 protocols, the promising
FIDO Alliance's proposal for a standard for passwordless user authentication. Our analysis …

An efficient key management and multi-layered security framework for SCADA systems

D Upadhyay, M Zaman, R Joshi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Supervisory Control and Data Acquisition (SCADA) networks play a vital role in industrial
control systems. Industrial organizations perform operations remotely through SCADA …

[PDF][PDF] A Formal Analysis of the FIDO UAF Protocol.

H Feng, H Li, X Pan, Z Zhao, T Cactilab - NDSS, 2021 - ndss-symposium.org
The FIDO protocol suite aims at allowing users to log in to remote services with a local and
trusted authenticator. With FIDO, relying services do not need to store user-chosen secrets …

Evaluating the Security Posture of Real-World FIDO2 Deployments

D Kuchhal, M Saad, A Oest, F Li - … of the 2023 ACM SIGSAC Conference …, 2023 - dl.acm.org
FIDO2 is a suite of protocols that combines the usability of local authentication (eg,
biometrics) with the security of public-key cryptography to deliver passwordless …

A formal analysis of the FIDO2 protocols

J Guan, H Li, H Ye, Z Zhao - European Symposium on Research in …, 2022 - Springer
FIDO2 is the latest member of the Fast IDentity Online (FIDO) protocol suite, which aims at
providing unified password-less authentication across the web. We present a formal security …

E-banking security study—10 years later

K Malinka, O Hujňák, P Hanáček… - IEEE Access, 2022 - ieeexplore.ieee.org
ICT security in the banking area is going through rapid changes. It is ten years since we
covered the state of e-banking security, and both authentication schemes and legislation …

[HTML][HTML] A novel formal logic for formal analysis of timeliness in non-repudiation protocols

K Yang, M Xiao, X Zhong, Y Zhong - … of King Saud University-Computer and …, 2023 - Elsevier
Non-repudiation protocols are aimed at exchanging digital messages and irrefutable
receipts between two mistrusting parties over the Internet, which form the cornerstones of …