Security for 4G and 5G Cellular Networks: A Survey of Existing Authentication and Privacy-preserving Schemes.
Mohamed Amine FerragLeandros A. MaglarasAntonios ArgyriouDimitrios KosmanosHelge JanickePublished in: CoRR (2017)
Keyphrases
- privacy preserving
- cellular networks
- secure multiparty computation
- sensitive data
- data privacy
- naive bayesian classification
- preserving privacy
- security requirements
- privacy preserving data mining
- privacy issues
- rfid tags
- security mechanisms
- wireless networks
- privacy concerns
- personal data
- authentication protocol
- privacy preservation
- vertically partitioned data
- privacy requirements
- security analysis
- homomorphic encryption
- mobile users
- sensitive information
- base station
- data security
- identity management
- privacy protection
- user privacy
- mobile networks
- semi honest
- access control
- low cost
- information security
- private information
- scalar product
- security protocols
- wifi
- lightweight
- differential privacy
- encryption scheme
- smart card
- data model