An improved and provably secure symmetric-key based 5G-AKA Protocol
One of the primary authentication mechanisms defined for the 5G system is the 5G-Authentication and Key Agreement (5G-AKA) protocol. It is set […]
An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices
Several symmetric and asymmetric encryption based authentication protocols have been developed for the wireless local area networks (WLANs). However, recent findings reveal […]
EmgAuth
Screen lock is a critical security feature for smartphones to prevent unauthorized access. Although various screen unlocking technologies, including fingerprint and facial […]
Trust in 5G and Beyond Networks
5G and beyond ecosystems will be characterized by a growing set of stakeholders and an increasing number of interconnected devices and services, […]
A Novel Authentication Mechanism for Mobile Satellite Communication Systems
The authentication protocols existing in the realm of mobile satellite communication networks, usually employ the one-time shared secret technique. Although the technique […]
AGE
Mobile and sensor related technologies are significantly revolutionizing the medical and healthcare sectors. In current healthcare systems, gadgets are the prominent way […]
Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks
The security of mobile communication largely depends on the strength of the authentication key exchange protocol. The 3rd Generation Partnership Project (3GPP) […]
Anonymous Lightweight Proxy Based Key Agreement for IoT (ALPKA)
The Internet of Things (IoT) technologies interconnect a broad range of network devices, differing in terms of size, weight, functionality, and resource […]