Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

MA Ferrag, L Maglaras, A Argyriou, D Kosmanos… - Journal of Network and …, 2018 - Elsevier
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …

Security for 5G mobile wireless networks

D Fang, Y Qian, RQ Hu - IEEE access, 2017 - ieeexplore.ieee.org
The advanced features of 5G mobile wireless network systems yield new security
requirements and challenges. This paper presents a comprehensive study on the security of …

Security requirements and challenges of 6G technologies and applications

SA Abdel Hakeem, HH Hussein, HW Kim - Sensors, 2022 - mdpi.com
After implementing 5G technology, academia and industry started researching 6th
generation wireless network technology (6G). 6G is expected to be implemented around the …

Enhanced authentication scheme with anonymity for roaming service in global mobility networks

CC Chang, CY Lee, YC Chiu - Computer Communications, 2009 - Elsevier
User authentication is an important security mechanism for recognizing legal roaming users.
In 2006, Lee, Hwang, and Liao proposed an enhanced authentication scheme with user …

A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks

F Wu, L Xu, S Kumari, X Li, AK Das… - Security and …, 2016 - Wiley Online Library
Ubiquitous networks support the roaming service for mobile communication devices. The
mobile user can use the services in the foreign network with the help of the home network …

Provable secure authentication protocol with anonymity for roaming service in global mobility networks

T Zhou, J Xu - Computer Networks, 2011 - Elsevier
User authentication is an important security mechanism for recognizing legal roaming users.
The emerging global mobility network, however, has called for new requirements for …

Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

Efficient privacy-preserving authentication in wireless mobile networks

HJ Jo, JH Paik, DH Lee - IEEE Transactions on Mobile …, 2013 - ieeexplore.ieee.org
Secure authentication in roaming services is being designed to allow legal users to get
access to wireless network services when they are away from their home location. Recently …

Anonymous two-factor authentication for consumer roaming service in global mobility networks

D He, N Kumar, MK Khan… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
As a mechanism to secure access to a global mobility network (GLOMONET), authentication
for consumer roaming service is an essential technology. Moreover, as mobile consumers …

A secure and effective anonymous authentication scheme for roaming service in global mobility networks

D Zhao, H Peng, L Li, Y Yang - Wireless Personal Communications, 2014 - Springer
Recently, Mun et al. analyzed Wu et al.'s authentication scheme and proposed an enhanced
anonymous authentication scheme for roaming service in global mobility networks …