Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes.
Mohamed Amine FerragLeandros A. MaglarasAntonios ArgyriouDimitrios KosmanosHelge JanickePublished in: J. Netw. Comput. Appl. (2018)
Keyphrases
- privacy preserving
- cellular networks
- secure multiparty computation
- sensitive data
- data privacy
- naive bayesian classification
- preserving privacy
- security mechanisms
- privacy issues
- wireless networks
- rfid tags
- security requirements
- personal data
- privacy requirements
- privacy preserving data mining
- authentication protocol
- privacy concerns
- privacy preservation
- security analysis
- private information
- base station
- vertically partitioned data
- identity management
- sensitive information
- mobile users
- homomorphic encryption
- information security
- privacy protection
- data security
- semi honest
- access control
- low cost
- intrusion detection
- wifi
- mobile networks
- user privacy
- scalar product
- multi hop
- public key
- cryptographic protocols
- statistical databases
- supply chain management
- mobile applications
- wireless communication
- communication networks
- data mining