[go: up one dir, main page]

Fang, 2019 - Google Patents

Efficient and Flexible Solutions for 5G Wireless Network Security

Fang, 2019

Document ID
6939178693841711059
Author
Fang D
Publication year

External Links

Snippet

The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. In this dissertation, 5G wireless network security is studied to provide flexibility and efficiency. Current 5G wireless security solutions are studied based on …
Continue reading at search.proquest.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W68/00Notification of users, e.g. alerting for incoming communication or change of service
    • H04W68/02Arrangements for increasing efficiency of notification or paging channel

Similar Documents

Publication Publication Date Title
Fang et al. Security for 5G mobile wireless networks
Cao et al. A survey on security aspects for 3GPP 5G networks
Wang et al. SDN-based handover authentication scheme for mobile edge computing in cyber-physical systems
KR101331515B1 (en) Method and appaeatus for base station self-configuration
Krishnan et al. Highly secured authentication and fast handover scheme for mobility management in 5G vehicular networks
Nyangaresi et al. Neuro-fuzzy based handover authentication protocol for ultra dense 5G networks
Lai et al. A novel authentication scheme supporting multiple user access for 5G and beyond
Kumar et al. Handover authentication scheme for device-to-device outband communication in 5G-WLAN next generation heterogeneous networks
Alnashwan et al. Privacy-aware secure region-based handover for small cell networks in 5G-enabled mobile communication
Lotto et al. Baron: Base-station authentication through core network for mobility management in 5g networks
Yu et al. Quantum-resistance authentication and data transmission scheme for NB-IoT in 3GPP 5G networks
Sharma et al. Exposing the security weaknesses of fifth generation handover communication
Kim Location-based authentication protocol for first cognitive radio networking standard
Nyangaresi et al. Intelligent target cell selection algorithm for low latency 5G networks
Wang et al. An enhanced authentication protocol for WRANs in TV white space
Khan et al. Secure authentication and key management protocols for mobile multihop WiMAX networks
Fang Efficient and Flexible Solutions for 5G Wireless Network Security
Suraci et al. Delivering multicast content through secure D2D communications in the Internet of Things
CN101999240A (en) Communication method, device and communication system between base stations
Fang et al. 5G Wireless Network Security and Privacy
Li et al. DTHA: A Digital Twin-Assisted Handover Authentication Scheme for 5G and Beyond
Islam et al. Security enhancement of d2d communication based on handshaking mechanism
Niranjani et al. Distributed security architecture for authentication in 4G networks
Ozhelvaci et al. Security for Handover and D2D Communication in 5G HetNets
Ozhelvaci Secure and efficient authentication schemes for 5G heterogeneous networks