Survey on authentication and security protocols and schemes over 5G networks.
Yahya M. TashtoushDirar A. DarweeshOla KarajehOmar A. DarwishMajdi MaabrehSafa' SwedatRawan KorayshOmar AlmousaNasser AlsaediPublished in: Int. J. Distributed Sens. Networks (2022)
Keyphrases
- security protocols
- authentication protocol
- security services
- security mechanisms
- cryptographic algorithms
- secure communication
- automated design
- security requirements
- key distribution
- security properties
- cryptographic protocols
- key management
- computer networks
- remote attestation
- security issues
- public key cryptography
- real time
- resource constrained
- artificial immune algorithm
- user authentication
- elliptic curve cryptography
- authentication scheme
- software development
- response time