An improved and provably secure symmetric-key based 5G-AKA Protocol
One of the primary authentication mechanisms defined for the 5G system is the 5G-Authentication and Key Agreement (5G-AKA) protocol. It is set […]
An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices
Several symmetric and asymmetric encryption based authentication protocols have been developed for the wireless local area networks (WLANs). However, recent findings reveal […]
A Novel Authentication Mechanism for Mobile Satellite Communication Systems
The authentication protocols existing in the realm of mobile satellite communication networks, usually employ the one-time shared secret technique. Although the technique […]
A Survey on Security and Privacy of 5G Technologies
Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and […]
5G Privacy
The next mobile generation, 5G, is expected to bring an enormous amount of new services and increased user experience. However adequate protection […]