A comprehensive review on the users’ identity privacy for 5G networks
Published 2022 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A comprehensive review on the users’ identity privacy for 5G networks
Authors
Keywords
-
Journal
IET Communications
Volume 16, Issue 5, Pages 384-399
Publisher
Institution of Engineering and Technology (IET)
Online
2022-03-02
DOI
10.1049/cmu2.12327
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Lightweight Cryptographic Algorithms for Guessing Attack Protection in Complex Internet of Things Applications
- (2021) Mohammad Kamrul Hasan et al. COMPLEXITY
- Learning-Empowered Privacy Preservation in Beyond 5G Edge Intelligence Networks
- (2021) Pengcheng Zhu et al. IEEE WIRELESS COMMUNICATIONS
- Reinforcement learning-based sensitive semantic location privacy protection for VANETs
- (2021) Minghui Min et al. China Communications
- Communication Delay Modeling for Wide Area Measurement System in Smart Grid Internet of Things Networks
- (2021) Mohammad Kamrul Hasan et al. WIRELESS COMMUNICATIONS & MOBILE COMPUTING
- Constriction Factor Particle Swarm Optimization based load balancing and cell association for 5G heterogeneous networks
- (2021) Mohammad Kamrul Hasan et al. COMPUTER COMMUNICATIONS
- Design and Evaluation of a Multihoming-Based Mobility Management Scheme to Support Inter Technology Handoff in PNEMO
- (2020) Shayla Islam et al. WIRELESS PERSONAL COMMUNICATIONS
- A Packet Delivery Cost Analysis of a Flow-Enabled Proxy NEMO Scheme in a Distributed Mobility Anchoring Environment
- (2020) Shayla Islam et al. Elektronika Ir Elektrotechnika
- Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology
- (2020) Imran Memon et al. Security and Communication Networks
- Phase Offset Analysis of Asymmetric Communications Infrastructure in Smart Grid
- (2019) Mohammad Kamrul Hasan et al. Elektronika Ir Elektrotechnika
- Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT
- (2018) Jianbing Ni et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
- (2018) Yongpeng Wu et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
- (2018) Mohamed Amine Ferrag et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Location and trajectory privacy preservation in 5G-Enabled vehicle social network services
- (2018) Dan Liao et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Security for 5G Mobile Wireless Networks
- (2018) Dongfeng Fang et al. IEEE Access
- Energy-Efficient Location Privacy Preserving in Vehicular Networks using Social Intimate Fogs
- (2018) Gaolei Li et al. IEEE Access
- Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics
- (2018) Yang Lu et al. IEEE Internet of Things Journal
- Security and Privacy for Cloud-Based IoT: Challenges
- (2017) Jun Zhou et al. IEEE COMMUNICATIONS MAGAZINE
- 5G: Adaptable Networks Enabled by Versatile Radio Access Technologies
- (2017) Conor Sexton et al. IEEE Communications Surveys and Tutorials
- EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
- (2017) Maria Azees et al. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
- Security and privacy challenges in mobile cloud computing: Survey and way ahead
- (2017) Muhammad Baqer Mollah et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Novel multihoming-based flow mobility scheme for proxy NEMO environment: A numerical approach to analyse handoff performance
- (2017) Shayla Islam et al. SCIENCEASIA
- A Survey of IoT Key Enabling and Future Technologies: 5G, Mobile IoT, Sematic Web and Applications
- (2017) Sotirios K. Goudos et al. WIRELESS PERSONAL COMMUNICATIONS
- Throughput Maximization for the Cross-Tier Interference in Heterogeneous Network
- (2016) Mohammad Kamrul Hasan et al.
- Physical-layer authentication for wireless security enhancement: current challenges and future developments
- (2016) Xianbin Wang et al. IEEE COMMUNICATIONS MAGAZINE
- Internet of Things in the 5G Era: Enablers, Architecture, and Business Models
- (2016) Maria Rita Palattella et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- Secure and Privacy-Aware Cloud-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks
- (2016) Mahmoud Hashem Eiza et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends
- (2016) Yulong Zou et al. PROCEEDINGS OF THE IEEE
- Survey on Threats and Attacks on Mobile Networks
- (2016) Silvere Mavoungou et al. IEEE Access
- A Location Cloaking Algorithm Based on Combinatorial Optimization for Location-Based Services in 5G Networks
- (2016) Ruiyun Yu et al. IEEE Access
- The Quest for Privacy in the Internet of Things
- (2016) Pawani Porambage et al. IEEE Cloud Computing
- Network function virtualization: Challenges and opportunities for innovations
- (2015) Bo Han et al. IEEE COMMUNICATIONS MAGAZINE
- Authentication handover and privacy protection in 5G hetnets using software-defined networking
- (2015) Xiaoyu Duan et al. IEEE COMMUNICATIONS MAGAZINE
- Frame-Based Medium Access Control for 5G Wireless Networks
- (2015) In Keun Son et al. MOBILE NETWORKS & APPLICATIONS
- Intrusion detection techniques for mobile cloud computing in heterogeneous 5G
- (2015) Keke Gai et al. Security and Communication Networks
- A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation
- (2014) Fei Hu et al. IEEE Communications Surveys and Tutorials
- Access control mechanisms for femtocells
- (2010) Guillaume de la Roche et al. IEEE COMMUNICATIONS MAGAZINE
- Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
- (2010) Nils Ulltveit-Moe et al. WIRELESS PERSONAL COMMUNICATIONS
- EDR: Efficient Decentralized Revocation Protocol for Vehicular Ad Hoc Networks
- (2009) A. Wasef et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now