2019
DOI: 10.1109/tdsc.2019.2916593
|View full text |Cite
|
Sign up to set email alerts
|

CPPHA: Capability-based Privacy-Protection Handover Authentication Mechanism for SDN-based 5G HetNets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 39 publications
(20 citation statements)
references
References 19 publications
0
20
0
Order By: Relevance
“…Cao et al [59] proposed a handover scheme by integrating the capabilities of network entity proposed in [60] into Duan's scheme [55]. The scheme fulfills all the security and privacy metrics as described above with low computation and communication overheads.…”
Section: The Delay Of Communication Between Bss ηmentioning
confidence: 99%
“…Cao et al [59] proposed a handover scheme by integrating the capabilities of network entity proposed in [60] into Duan's scheme [55]. The scheme fulfills all the security and privacy metrics as described above with low computation and communication overheads.…”
Section: The Delay Of Communication Between Bss ηmentioning
confidence: 99%
“…The results show that the proposed model reduces latency compared to similar models. In [95], a capabilitybased privacy protection HO authentication mechanism has been proposed to address the common HO authentication issue in SDN-based 5G HetNets. The authentication HO module is integrated into the SDN controller to monitor users and predict their future location and pre-prepare cells or select suitable cells in advance.…”
Section: B Sdn Based Solutionsmentioning
confidence: 99%
“…The anonymity-based solution is suitable for preserving location privacy, and proper identity management is inevitable for maintaining identity privacy. In paper [30], a novel HAM is proposed for 5G HetNets, and this mechanism ensures traceability and user anonymity using SDN technique and user capability integration. The proposed scheme doesn't involve the third party during authentication and key agreement between users' equipment and base stations in 5G HetNets.…”
Section: A Privacy Protection In 5gmentioning
confidence: 99%