Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

MA Ferrag, L Maglaras, A Argyriou, D Kosmanos… - Journal of Network and …, 2018 - Elsevier
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …

Lightweight and provably secure user authentication with anonymity for the global mobility network

C Chen, D He, S Chan, J Bu, Y Gao… - International Journal of …, 2011 - Wiley Online Library
Seamless roaming in the global mobility network (GLOMONET) is highly desirable for
mobile users, although their proper authentication is challenging. This is because not only …

Anonymity and closely related terms in the cyberspace: An analysis by example

G Kambourakis - Journal of information security and applications, 2014 - Elsevier
Anonymity is generally conceived to be an integral part of user's right to privacy. Without
anonymity, many online activities would become prone to eavesdropping, making them …

A novel group-based handover authentication scheme with privacy preservation for mobile WiMAX networks

A Fu, S Lan, B Huang, Z Zhu… - IEEE Communications …, 2012 - ieeexplore.ieee.org
This letter proposes an efficient group-based handover authentication scheme for mobile
WiMAX networks. When the first Mobile Station (MS) of the handover group moves from the …

PrivaKERB: A user privacy framework for Kerberos

F Pereniguez, R Marin-Lopez, G Kambourakis… - computers & …, 2011 - Elsevier
Kerberos is one of the most well-respected and widely used authentication protocols in open
and insecure networks. It is envisaged that its impact will increase as it comprises a reliable …

[PDF][PDF] 物联网中移动Sensor 节点游的组合安全认证协议

王良民, 姜顺荣, 郭渊博 - 中国科学: 信息科学, 2012 - academia.edu
摘要物联网包含感知子网和传输骨干网, 其感知子网中节点能力受限, 往往利用移动的传感器
节点跨区域访问获取信息; 而其传输骨干网络需要依托现有Internet 的基础设施 …

A novel ID-Based authentication and key exchange protocol resistant to ephemeral-secret-leakage attacks for mobile devices

YM Tseng, SS Huang, TT Tsai… - International Journal of …, 2015 - journals.sagepub.com
With the rapid development in wireless communications and cloud computing technologies,
clients (users) often use handheld mobile devices to access remote servers via open …

EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks

T Yang, C Lai, R Lu, R Jiang - Peer-to-Peer Networking and Applications, 2015 - Springer
The maritime wideband communication network, which extends the operation of wireless
access from land to sea, will significantly contribute to the maritime distress, urgency, safety …

[PDF][PDF] Secure and efficient vertical handover in heterogeneous wireless networks

MW Khan - International journal of advanced networking and …, 2013 - researchgate.net
-------------------------------------------------------------------ABSTRACT-------------------------------------------
-------------------Handover occurs when a wireless node switches from one network to another …

Simple and low-cost re-authentication protocol for HeNB

L Chengzhe, L Hui, Z Yueyu, C Jin - China Communications, 2013 - ieeexplore.ieee.org
The 3rd Generation Partnership Project (3GPP) defined a new architecture, called Home
eNode B (HeNB). The 3GPP has also presented a protocol for communications between …