[HTML][HTML] A survey on 6G enabled light weight authentication protocol for UAVs, security, open research issues and future directions

AS Khan, MA Sattar, K Nisar, AAA Ibrahim, NB Annuar… - Applied Sciences, 2022 - mdpi.com
This paper demonstrates a broad exploration of existing authentication and secure
communication of unmanned aerial vehicles (UAVs) in a '6G network'. We begin with an …

[HTML][HTML] Blockchain-based multifactor authentication for future 6G cellular networks: A systematic review

J Asim, AS Khan, RM Saqib, J Abdullah, Z Ahmad… - Applied Sciences, 2022 - mdpi.com
There are continued advances in the internet and communication fields regarding the
deployment of 5G-based applications. It is expected that by 2030, 6G applications will …

Proposing a data privacy aware protocol for roadside accident video reporting service using 5G in Vehicular Cloud Networks Environment

ZA Almusaylim, N Zaman… - 2018 4th International …, 2018 - ieeexplore.ieee.org
The bandwidth hungry applications are growing drastically and soon exceeding the
bandwidth limits of existing wireless communication network systems. The current …

Lightweight multifactor authentication scheme for nextgen cellular networks

AS Khan, Y Javed, RM Saqib, Z Ahmad… - IEEE …, 2022 - ieeexplore.ieee.org
With increased interest in 6G (6th Generation) cellular networks that can support intelligently
small-cell communication will result in effective device-to-device (D2D) communication. High …

[HTML][HTML] 5G device-to-device communication security and multipath routing solutions

A Celik, J Tetzner, K Sinha, J Matta - Applied Network Science, 2019 - Springer
Through direct communication, device-to-device (D2D) technology can increase the overall
throughput, enhance the coverage, and reduce the power consumption of cellular …

Cyber security threats for 5G networks

JP Mohan, N Sugunaraj… - 2022 IEEE international …, 2022 - ieeexplore.ieee.org
The fifth-generation mobile network (5G) services have the potential to provide high-speed
connectivity to a large user base with excellent benchmarks on low latencies, large capacity …

Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS)

AS Khan, Y Javed, J Abdullah, K Zen - Journal of Ambient Intelligence and …, 2021 - Springer
D2D communication is an integral part of LTE-Advance and 5G cellular networks, has
gained a lot of popularity in recent years as it offers high speed, extended coverage, and …

[HTML][HTML] A lightweight elliptic-Elgamal-based authentication scheme for secure device-to-device communication

A Abro, Z Deng, KA Memon - Future Internet, 2019 - mdpi.com
Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended
coverage where devices can act as users or relays. These relays normally act as decode …

Blockchain-based lightweight multifactor authentication for cell-free in ultra-dense 6G-based (6-CMAS) cellular network

AS Khan, MIB Yahya, KB Zen, JB Abdullah… - IEEE …, 2023 - ieeexplore.ieee.org
Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultra-dense
cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive …

A novel authentication and key agreement scheme for countering MITM and impersonation attack in medical facilities

SO Maikol, AS Khan, Y Javed… - International …, 2021 - penerbit.uthm.edu.my
Authentication is used to enfold the privacy of the patient to implement security onto the
communication between patients and service providers. Several types of research have …