Fang, 2019 - Google Patents
Efficient and Flexible Solutions for 5G Wireless Network SecurityFang, 2019
- Document ID
- 6939178693841711059
- Author
- Fang D
- Publication year
External Links
Snippet
The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. In this dissertation, 5G wireless network security is studied to provide flexibility and efficiency. Current 5G wireless security solutions are studied based on …
- 238000000034 method 0 abstract description 43
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W68/00—Notification of users, e.g. alerting for incoming communication or change of service
- H04W68/02—Arrangements for increasing efficiency of notification or paging channel
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Fang et al. | Security for 5G mobile wireless networks | |
| Cao et al. | A survey on security aspects for 3GPP 5G networks | |
| Wang et al. | SDN-based handover authentication scheme for mobile edge computing in cyber-physical systems | |
| KR101331515B1 (en) | Method and appaeatus for base station self-configuration | |
| Krishnan et al. | Highly secured authentication and fast handover scheme for mobility management in 5G vehicular networks | |
| Nyangaresi et al. | Neuro-fuzzy based handover authentication protocol for ultra dense 5G networks | |
| Lai et al. | A novel authentication scheme supporting multiple user access for 5G and beyond | |
| Kumar et al. | Handover authentication scheme for device-to-device outband communication in 5G-WLAN next generation heterogeneous networks | |
| Alnashwan et al. | Privacy-aware secure region-based handover for small cell networks in 5G-enabled mobile communication | |
| Lotto et al. | Baron: Base-station authentication through core network for mobility management in 5g networks | |
| Yu et al. | Quantum-resistance authentication and data transmission scheme for NB-IoT in 3GPP 5G networks | |
| Sharma et al. | Exposing the security weaknesses of fifth generation handover communication | |
| Kim | Location-based authentication protocol for first cognitive radio networking standard | |
| Nyangaresi et al. | Intelligent target cell selection algorithm for low latency 5G networks | |
| Wang et al. | An enhanced authentication protocol for WRANs in TV white space | |
| Khan et al. | Secure authentication and key management protocols for mobile multihop WiMAX networks | |
| Fang | Efficient and Flexible Solutions for 5G Wireless Network Security | |
| Suraci et al. | Delivering multicast content through secure D2D communications in the Internet of Things | |
| CN101999240A (en) | Communication method, device and communication system between base stations | |
| Fang et al. | 5G Wireless Network Security and Privacy | |
| Li et al. | DTHA: A Digital Twin-Assisted Handover Authentication Scheme for 5G and Beyond | |
| Islam et al. | Security enhancement of d2d communication based on handshaking mechanism | |
| Niranjani et al. | Distributed security architecture for authentication in 4G networks | |
| Ozhelvaci et al. | Security for Handover and D2D Communication in 5G HetNets | |
| Ozhelvaci | Secure and efficient authentication schemes for 5G heterogeneous networks |