Survey on authentication and security protocols and schemes over 5G networks
The emergence of fifth generation networks opens the doors for Internet of Things environment to spread widely. The number of connected devices to fifth generation networks is expected to increase to more than 1.7 billion users by 2025. Each year, millions of modern devices go online at the beginnin...
Saved in:
| Main Authors: | Yahya Tashtoush, Dirar Darweesh, Ola Karajeh, Omar Darwish, Majdi Maabreh, Safa’ Swedat, Rawan Koraysh, Omar Almousa, Nasser Alsaedi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2022-10-01
|
| Series: | International Journal of Distributed Sensor Networks |
| Online Access: | https://doi.org/10.1177/15501329221126609 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Hardware and Software Methods for Secure Obfuscation and Deobfuscation: An In-Depth Analysis
by: Khaled Saleh, et al.
Published: (2025-06-01) -
Emo-SL Framework: Emoji Sentiment Lexicon Using Text-Based Features and Machine Learning for Sentiment Analysis
by: Manar Alfreihat, et al.
Published: (2024-01-01) -
Secure access authentication scheme for 4G wireless network based on PCL
by: Li-li WANG, et al.
Published: (2012-04-01) -
Fast handover authentication scheme in 5G mobile edge computing scenarios
by: Weicheng ZHANG, et al.
Published: (2022-06-01) -
Enhanced Detection of Intrusion Detection System in Cloud Networks Using Time-Aware and Deep Learning Techniques
by: Nima Terawi, et al.
Published: (2025-07-01)