An improved authentication and security scheme for LTE/LTE-A networks.
Prabhat Kumar PandaSudipta ChattopadhyayPublished in: J. Ambient Intell. Humaniz. Comput. (2020)
Keyphrases
- authentication mechanism
- authentication protocol
- authentication scheme
- long term evolution
- cellular networks
- security analysis
- key agreement
- key distribution
- identity based cryptography
- elliptic curve cryptography
- quality of service
- security requirements
- fourth generation
- wireless local area network
- graphical password
- high security
- secure communication
- pricing model
- security mechanisms
- internet access
- data encryption
- private key
- public key
- user authentication
- public key cryptography
- wireless networks
- key management
- wireless communication
- smart card
- encryption decryption
- security services
- mutual authentication
- key agreement protocol
- access control
- diffie hellman
- identity authentication
- security properties
- security issues
- public key encryption
- rights management
- integrity verification
- fuzzy vault
- elliptic curve
- secret key
- mobile networks
- information security
- image authentication
- security model
- security systems
- authentication systems
- protection scheme
- secret sharing scheme
- biometric template
- ad hoc networks
- biometric authentication
- identity management
- digital signature
- mobile users
- base station
- security protocols