2020 2nd Global Power, Energy and Communication Conference (GPECOM) 2020
DOI: 10.1109/gpecom49333.2020.9247938
|View full text |Cite
|
Sign up to set email alerts
|

Neuro-Fuzzy Based Handover Authentication Protocol for Ultra Dense 5G Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 37 publications
(20 citation statements)
references
References 21 publications
0
20
0
Order By: Relevance
“…A protocol is built in [17] to mitigate the vulnerabilities which make it susceptible to jamming, DoS attacks, missing key confirmatory attacks, traceability attacks, and replay attacks. Any such attacks were prevented by the developing specification; the use of that protocol is clear since it maintains the traditional 5G architecture.…”
Section: Handover Operationmentioning
confidence: 99%
“…A protocol is built in [17] to mitigate the vulnerabilities which make it susceptible to jamming, DoS attacks, missing key confirmatory attacks, traceability attacks, and replay attacks. Any such attacks were prevented by the developing specification; the use of that protocol is clear since it maintains the traditional 5G architecture.…”
Section: Handover Operationmentioning
confidence: 99%
“…Authors in [25][26][27] have introduced bilinear pairing based mutual authentication schemes, but which results in excessive computational overheads [28] . On the other hand, the smart card based biometric authentication algorithm in [29] cannot provide anonymity and is vulnerable to impersonation attacks [15] .…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, a multilayer perception neural network (MPNN) is presented in [17] for delay reduction. Similarly, a neuro-fuzzy based technique is developed in [18] for QoS optimization.…”
Section: Introductionmentioning
confidence: 99%