5G provides a unified authentication architecture and access management for IoT (Internet of Things) devices. But existing authentication services cannot cover massive IoT devices with various computing capabilities. In addition, with the development of quantum computing, authentication schemes based on traditional digital signature technology may not be as secure as we expected. This paper studies the authentication mechanism from the user equipment to the external data network in 5G and proposed an authentication protocol prototype that conforms to the Third Generation Partnership Program (3GPP) standard. This prototype can accommodate various Hash-based signature technologies, applying their advantages in resource consumption to meet the...
The futuristic 5G network is designed to accommodate the increasing number of connected devices with...
Abstract. Security aspects must be considered in the next generation of IoT and 5G networks. From th...
Modern societies are moving toward an information-oriented environment. To gather and utilize inform...
5G provides a unified authentication architecture and access management for IoT (Internet of Things)...
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA...
The emergence of narrowband Internet of Things (NB-IoT) has brought hope for the popularization and ...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
This paper proposes a blockchain-based identity authentication (BA) scheme for IoT devices to solve ...
The Internet of Things (IoT) and 5G networks play important roles in the latest systems for managing...
The use of Internet of things (IoT) devices is on the rise and given their involvement with sensitiv...
Wireless network devices are used for the Internet of Things in a variety of applications, and altho...
The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but mus...
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and aut...
Internet of Things (IoT) is an expanding technology that facilitate physical devices to inter-connec...
In the Internet-driven world, not only computers but things also get connected. It also allows the t...
The futuristic 5G network is designed to accommodate the increasing number of connected devices with...
Abstract. Security aspects must be considered in the next generation of IoT and 5G networks. From th...
Modern societies are moving toward an information-oriented environment. To gather and utilize inform...
5G provides a unified authentication architecture and access management for IoT (Internet of Things)...
While numerous digital signature schemes exist in the literature, most real-world system rely on RSA...
The emergence of narrowband Internet of Things (NB-IoT) has brought hope for the popularization and ...
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. Internet of Things (IoT) has become the dr...
This paper proposes a blockchain-based identity authentication (BA) scheme for IoT devices to solve ...
The Internet of Things (IoT) and 5G networks play important roles in the latest systems for managing...
The use of Internet of things (IoT) devices is on the rise and given their involvement with sensitiv...
Wireless network devices are used for the Internet of Things in a variety of applications, and altho...
The futuristic fifth-generation cellular network (5G) not only supports high-speed internet, but mus...
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and aut...
Internet of Things (IoT) is an expanding technology that facilitate physical devices to inter-connec...
In the Internet-driven world, not only computers but things also get connected. It also allows the t...
The futuristic 5G network is designed to accommodate the increasing number of connected devices with...
Abstract. Security aspects must be considered in the next generation of IoT and 5G networks. From th...
Modern societies are moving toward an information-oriented environment. To gather and utilize inform...