Survey on authentication and security protocols and schemes over 5G networks

dc.contributor.authorTashtoush, Yahyaen
dc.contributor.authorDarweesh, Diraren
dc.contributor.authorKarajeh, Olaen
dc.contributor.authorDarwish, Omaren
dc.contributor.authorMaabreh, Majdien
dc.contributor.authorSwedat, Safa'en
dc.contributor.authorKoraysh, Rawanen
dc.contributor.authorAlmousa, Omaren
dc.contributor.authorAlsaedi, Nasseren
dc.date.accessioned2023-05-05T19:06:47Zen
dc.date.available2023-05-05T19:06:47Zen
dc.date.issued2022-10en
dc.description.abstractThe emergence of fifth generation networks opens the doors for Internet of Things environment to spread widely. The number of connected devices to fifth generation networks is expected to increase to more than 1.7 billion users by 2025. Each year, millions of modern devices go online at the beginning of the school year and after the holidays, and you can even notice the publicity of Internet of Things devices swinging with the seasons. Nowadays, these devices are considered to be very important to our daily life. That is because they provide power to our homes, organize our work operations and let communications more suitable. As a result of the increasing number of connected devices to fifth generation networks, the necessity to protect these Internet of Things devices against different types of cyber-attacks is also increased. For this reason, many researchers proposed different protocols and schemes to achieve the security of the Internet of Things devices. In this article, we introduce a survey of some protocols proposed by researchers in different domains and make a comparative study between them in terms of their category, authentication process, evaluation methodology, advantages, target, development year and applications within Internet of Things environment. The objective of this survey is to provide researchers with rich information about these protocols and their uses within Internet of Things systems, whether they can be used for cloud radio access networks, Internet of Things general purposes, telecommunications systems, e-healthcare systems or drone delivery service systems. It can also assist them in choosing the proper protocol to be used according to the type of their Internet of Things system.en
dc.description.versionPublished versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.doihttps://doi.org/10.1177/15501329221126609en
dc.identifier.issue10en
dc.identifier.other1.55013292211266E+016en
dc.identifier.urihttp://hdl.handle.net/10919/114940en
dc.identifier.volume18en
dc.language.isoenen
dc.publisherSageen
dc.rightsCreative Commons Attribution 4.0 Internationalen
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/en
dc.subjectFifth generationen
dc.subjectInternet of Thingsen
dc.subjectmutual authenticationen
dc.subjectprotocolen
dc.subjectschemeen
dc.titleSurvey on authentication and security protocols and schemes over 5G networksen
dc.title.serialInternational Journal of Distributed Sensor Networksen
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
15501329221126609.pdf
Size:
524.21 KB
Format:
Adobe Portable Document Format
Description:
Published version