2020
DOI: 10.1109/access.2020.2969986
|View full text |Cite
|
Sign up to set email alerts
|

An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks

Abstract: Currently, the popularity of the Internet of Things (IoT) has brought about an increase in the amount of data, so multi-server distributed cloud computing has been widely used in various applications that have brought convenience to our daily lives. At the same time, the development of the fifth generation (5G) of mobile communication technology has gradually become the main driving force for the popularization of the IoT. Because the 5G network is a heterogeneous network with multiple servers and small cells,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
66
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 96 publications
(66 citation statements)
references
References 45 publications
0
66
0
Order By: Relevance
“…Anonymity mainly contains: (1) User's/sensor's real identity could be revealed by adversaries; and (2) User/sensor untraceability ensures the adversary could not distinguish whether two communications from the same (unknown) partners [20]. Recently, different authentication protocols [13], [14] have been proposed to provide user anonymity and untraceability for various environment such as 5G network and fog computing environment. Xue [12] and Fan [15] claimed that their dynamic pseudonym identitybased authentication protocols could achieve user anonymity by only involving hash and XOR operations.…”
Section: Related Workmentioning
confidence: 99%
“…Anonymity mainly contains: (1) User's/sensor's real identity could be revealed by adversaries; and (2) User/sensor untraceability ensures the adversary could not distinguish whether two communications from the same (unknown) partners [20]. Recently, different authentication protocols [13], [14] have been proposed to provide user anonymity and untraceability for various environment such as 5G network and fog computing environment. Xue [12] and Fan [15] claimed that their dynamic pseudonym identitybased authentication protocols could achieve user anonymity by only involving hash and XOR operations.…”
Section: Related Workmentioning
confidence: 99%
“…Step1: The traffic flow data collected by ground monitors are denoised by wavelet analysis in order to remove the interference signals. In the process of data monitoring, some encryption technologies [23,24,[29][30][31][32]…”
Section: B Application Of Qga-lvq Neural Network In Short-term Traffmentioning
confidence: 99%
“…Therefore, the equation for photovoltaic cell output power can be obtained by multiplying Equations (2) and 3, as shown in Equation 4.…”
Section: Physical Model Of Photovoltaic Cellmentioning
confidence: 99%
“…At present, with the rapid development of computer technology [2][3][4][5][6], intelligent computing is one of the important methods of intelligent science, and it is also a cutting-edge subject of information technology. The intelligent computing technologies and new methods developed in recent years have been widely used in many disciplines, and have achieved fruitful results in military, financial engineering, nonlinear system optimization, knowledge engineering, and computer-aided medical diagnosis.…”
Section: Introductionmentioning
confidence: 99%