Hand it Over Carefully: Security Breach during Handover in 5G-V2X.
Meenu Rani DeyMoumita PatraPublished in: COMSNETS (2023)
Keyphrases
- sensitive data
- security requirements
- information security
- network security
- privacy issues
- access control
- security policies
- statistical databases
- intrusion detection
- computer security
- security threats
- security issues
- security systems
- personal data
- key management
- security level
- mobile communication
- security protocols
- mobile networks
- privacy preserving
- computer networks
- information technology
- security mechanisms
- wireless networks