Skip to main content
Top
Published in:
Cover of the book

2022 | OriginalPaper | Chapter

Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things

Authors : Mustafa A. Al Sibahee, Vincent Omollo Nyangaresi, Junchao Ma, Zaid Ameen Abduljabbar

Published in: IoT as a Service

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

To ensure secure access to the data held in internet of things, many lightweight authentication schemes have been developed using approaches such as symmetric cryptography or hashing operations. Although these schemes achieve forward key secrecy and user anonymity, de-synchronization is a major problem in these protocols. As such, many other schemes have been presented to address this pertinent security challenge. However, some of these schemes are still susceptible to smart card loss attacks among others. In this paper, stochastic security ephemeral generation protocol for 5G enabled internet of things is presented. It is demonstrated to offer mutual authentication and session key agreement. It is also robust against packet replays, eavesdropping and man-in-the-middle attacks. In terms of performance, it has the lowest computation and communication overheads.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Fu, Z., Huang, F., Ren, K., Weng, J., Wang, C.: Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12, 1874–1884 (2017)CrossRef Fu, Z., Huang, F., Ren, K., Weng, J., Wang, C.: Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans. Inf. Forensics Secur. 12, 1874–1884 (2017)CrossRef
2.
go back to reference Shin, S., Kwon, T.: A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things. IEEE Access 8, 67555–67571 (2020)CrossRef Shin, S., Kwon, T.: A privacy-preserving authentication, authorization, and key agreement scheme for wireless sensor networks in 5G-integrated Internet of Things. IEEE Access 8, 67555–67571 (2020)CrossRef
3.
go back to reference Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A.K., Choo, K.K.: A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. 103, 194–204 (2018)CrossRef Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A.K., Choo, K.K.: A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. 103, 194–204 (2018)CrossRef
4.
go back to reference Nyangaresi, V.O., Affane Moundounga, A.R.: Secure data exchange scheme for smart grids. In: 2021 IEEE 6th International Forum on Research and Technology for Society and Industry (RTSI), pp. 312–316. IEEE, Naples (2021) Nyangaresi, V.O., Affane Moundounga, A.R.: Secure data exchange scheme for smart grids. In: 2021 IEEE 6th International Forum on Research and Technology for Society and Industry (RTSI), pp. 312–316. IEEE, Naples (2021)
5.
go back to reference Kumar, D., Singh, H.K., Ahlawat, C.: A secure three-factor authentication scheme for wireless sensor networks using ECC. J. Discrete Math. Sci. Cryptogr. 23(4), 879–900 (2020)MathSciNetCrossRef Kumar, D., Singh, H.K., Ahlawat, C.: A secure three-factor authentication scheme for wireless sensor networks using ECC. J. Discrete Math. Sci. Cryptogr. 23(4), 879–900 (2020)MathSciNetCrossRef
6.
go back to reference Pundir, S., Wazid, M., Singh, D.P., Das, A.K., Rodrigues, J.J., Park, Y.: Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: survey and future challenges. IEEE Access 8, 3343–3363 (2019)CrossRef Pundir, S., Wazid, M., Singh, D.P., Das, A.K., Rodrigues, J.J., Park, Y.: Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: survey and future challenges. IEEE Access 8, 3343–3363 (2019)CrossRef
7.
go back to reference Amin, R., Islam, S.H., Kumar, N., Choo, K.K.R.: An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. J. Netw. Comput. Appl. 104, 133–144 (2018)CrossRef Amin, R., Islam, S.H., Kumar, N., Choo, K.K.R.: An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. J. Netw. Comput. Appl. 104, 133–144 (2018)CrossRef
8.
go back to reference Nyangaresi, V.O., Ogundoyin, S.O.: Certificate based authentication scheme for smart homes. In: 2021 3rd Global Power, Energy and Communication Conference (GPECOM), pp. 202–207. IEEE, Antalya (2021) Nyangaresi, V.O., Ogundoyin, S.O.: Certificate based authentication scheme for smart homes. In: 2021 3rd Global Power, Energy and Communication Conference (GPECOM), pp. 202–207. IEEE, Antalya (2021)
9.
go back to reference Gope, P., Das, A.K., Kumar, N., Cheng, Y.: Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans. Industr. Inf. 15(9), 4957–4968 (2019)CrossRef Gope, P., Das, A.K., Kumar, N., Cheng, Y.: Lightweight and physically secure anonymous mutual authentication protocol for real-time data access in industrial wireless sensor networks. IEEE Trans. Industr. Inf. 15(9), 4957–4968 (2019)CrossRef
10.
go back to reference Nyangaresi, V.O.: Lightweight key agreement and authentication protocol for smart homes. In: 2021 IEEE AFRICON, pp. 1–6. IEEE, Arusha (2021) Nyangaresi, V.O.: Lightweight key agreement and authentication protocol for smart homes. In: 2021 IEEE AFRICON, pp. 1–6. IEEE, Arusha (2021)
11.
go back to reference Zhu, H., Tan, Y.A., Zhu, L., Wang, X., Zhang, Q., Li, Y.: An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors 18(5), 1–15 (2018)CrossRef Zhu, H., Tan, Y.A., Zhu, L., Wang, X., Zhang, Q., Li, Y.: An identity-based anti-quantum privacy-preserving blind authentication in wireless sensor networks. Sensors 18(5), 1–15 (2018)CrossRef
12.
go back to reference Nyangaresi, V.O., Alsamhi, S.H.: Towards secure traffic signaling in smart grids. In: 2021 3rd Global Power, Energy and Communication Conference (GPECOM), pp. 196–201. IEEE, Antalya (2021) Nyangaresi, V.O., Alsamhi, S.H.: Towards secure traffic signaling in smart grids. In: 2021 3rd Global Power, Energy and Communication Conference (GPECOM), pp. 196–201. IEEE, Antalya (2021)
13.
go back to reference Karakaya, A., Akleylek, S.: A survey on security threats and authentication approaches in wireless sensor networks. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1–4. IEEE, Antalya (2018) Karakaya, A., Akleylek, S.: A survey on security threats and authentication approaches in wireless sensor networks. In: 2018 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1–4. IEEE, Antalya (2018)
15.
go back to reference Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J., Shu, L.: Authentication protocols for Internet of Things: a comprehensive survey. Secur. Commun. Network 2017, 1–41 (2017)CrossRef Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J., Shu, L.: Authentication protocols for Internet of Things: a comprehensive survey. Secur. Commun. Network 2017, 1–41 (2017)CrossRef
17.
go back to reference Shen, J., Chang, S., Shen, J., Liu, Q., Sun, X.: A lightweight multi-layer authentication protocol for wireless body area networks. Futur. Gener. Comput. Syst. 78, 956–963 (2018)CrossRef Shen, J., Chang, S., Shen, J., Liu, Q., Sun, X.: A lightweight multi-layer authentication protocol for wireless body area networks. Futur. Gener. Comput. Syst. 78, 956–963 (2018)CrossRef
18.
go back to reference Sureshkumar, C., Sabena, S.: Fuzzy-based secure authentication and clustering algorithm for improving the energy efficiency in wireless sensor networks. Wireless Pers. Commun. 112(3), 1517–1536 (2020)CrossRef Sureshkumar, C., Sabena, S.: Fuzzy-based secure authentication and clustering algorithm for improving the energy efficiency in wireless sensor networks. Wireless Pers. Commun. 112(3), 1517–1536 (2020)CrossRef
19.
go back to reference Nyangaresi, V.O., Petrovic, N.: Efficient PUF based authentication protocol for internet of drones. In: 2021 International Telecommunications Conference (ITC-Egypt), pp. 1–4. IEEE, Alexandria (2021) Nyangaresi, V.O., Petrovic, N.: Efficient PUF based authentication protocol for internet of drones. In: 2021 International Telecommunications Conference (ITC-Egypt), pp. 1–4. IEEE, Alexandria (2021)
20.
go back to reference Choo, K.K.R., Nam, J., Won, D.: A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Inf. Sci. 281, 182–200 (2014)MathSciNetCrossRef Choo, K.K.R., Nam, J., Won, D.: A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Inf. Sci. 281, 182–200 (2014)MathSciNetCrossRef
21.
go back to reference Nyangaresi, V.O., Mohammad, Z.: Privacy preservation protocol for smart grid networks. In: 2021 International Telecommunications Conference (ITC-Egypt), pp. 1–4. IEEE, Alexandria (2021) Nyangaresi, V.O., Mohammad, Z.: Privacy preservation protocol for smart grid networks. In: 2021 International Telecommunications Conference (ITC-Egypt), pp. 1–4. IEEE, Alexandria (2021)
22.
go back to reference Xiong, L., Xiong, N., Wang, C., Yu, X., Shuai, M.: An efficient lightweight authentication scheme with adaptive resilience of asynchronization attacks for wireless sensor networks. IEEE Trans. Syst. Man Cybern. Syst. 51(9), 5626–5638 (2019)CrossRef Xiong, L., Xiong, N., Wang, C., Yu, X., Shuai, M.: An efficient lightweight authentication scheme with adaptive resilience of asynchronization attacks for wireless sensor networks. IEEE Trans. Syst. Man Cybern. Syst. 51(9), 5626–5638 (2019)CrossRef
23.
go back to reference Park, Y., Park, Y.: Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors 16(12), 2123 (2016)CrossRef Park, Y., Park, Y.: Three-factor user authentication and key agreement using elliptic curve cryptosystem in wireless sensor networks. Sensors 16(12), 2123 (2016)CrossRef
24.
go back to reference Wang, C., Xu, G., Sun, J.: An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors 17(12), 2946 (2017)CrossRef Wang, C., Xu, G., Sun, J.: An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks. Sensors 17(12), 2946 (2017)CrossRef
25.
go back to reference Maurya, A., Sastry, V.N.: Fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and Internet of Things. Information 8(4), 136 (2017)CrossRef Maurya, A., Sastry, V.N.: Fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and Internet of Things. Information 8(4), 136 (2017)CrossRef
26.
go back to reference Das, A.K.: A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-Peer Network. Appl. 9(1), 223–244 (2016)CrossRef Das, A.K.: A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks. Peer-Peer Network. Appl. 9(1), 223–244 (2016)CrossRef
27.
go back to reference Das, A.K.: A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int. J. Commun. Syst. 30(1), e2933 (2017)CrossRef Das, A.K.: A secure and effective biometric-based user authentication scheme for wireless sensor networks using smart card and fuzzy extractor. Int. J. Commun. Syst. 30(1), e2933 (2017)CrossRef
28.
go back to reference Wu, F., Xu, L., Kumari, S., Li, X.: An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-Peer Network. Appl. 11(1), 1–20 (2018)CrossRef Wu, F., Xu, L., Kumari, S., Li, X.: An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-Peer Network. Appl. 11(1), 1–20 (2018)CrossRef
29.
go back to reference Wu, F., Xu, L., Kumari, S., Li, X.: A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-Peer Network. Appl. 10(1), 16–30 (2017)CrossRef Wu, F., Xu, L., Kumari, S., Li, X.: A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-Peer Network. Appl. 10(1), 16–30 (2017)CrossRef
30.
go back to reference Wang, D., Li, W., Wang, P.: Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans. Industr. Inf. 14(9), 4081–4092 (2018)CrossRef Wang, D., Li, W., Wang, P.: Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks. IEEE Trans. Industr. Inf. 14(9), 4081–4092 (2018)CrossRef
31.
go back to reference Li, F., Xiong, P.: Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE Sens. J. 13(10), 3677–3684 (2013)CrossRef Li, F., Xiong, P.: Practical secure communication for integrating wireless sensor networks into the internet of things. IEEE Sens. J. 13(10), 3677–3684 (2013)CrossRef
32.
go back to reference Nyangaresi, V.O., Rodrigues, A.J., Abeka, S.O.: Efficient group authentication protocol for secure 5G enabled vehicular communications. In: 2020 16th International Computer Engineering Conference (ICENCO), pp. 25–30. IEEE, Giza (2020) Nyangaresi, V.O., Rodrigues, A.J., Abeka, S.O.: Efficient group authentication protocol for secure 5G enabled vehicular communications. In: 2020 16th International Computer Engineering Conference (ICENCO), pp. 25–30. IEEE, Giza (2020)
33.
go back to reference Xue, K., Ma, C., Hong, P., Ding, R.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36, 316–323 (2013)CrossRef Xue, K., Ma, C., Hong, P., Ding, R.: A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. J. Netw. Comput. Appl. 36, 316–323 (2013)CrossRef
34.
go back to reference He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321, 263–277 (2015) He, D., Kumar, N., Chilamkurti, N.: A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321, 263–277 (2015)
35.
go back to reference Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Leng, L., Kumar, N.: Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Netw. 101, 42–62 (2016)CrossRef Amin, R., Islam, S.H., Biswas, G.P., Khan, M.K., Leng, L., Kumar, N.: Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput. Netw. 101, 42–62 (2016)CrossRef
36.
go back to reference Jiang, Q., Zeadally, S., Ma, J., He, D.: Lightweight three-factor authentication and key agreement protocol for Internet-integrated wireless sensor networks. IEEE Access 5, 3376–3392 (2017) Jiang, Q., Zeadally, S., Ma, J., He, D.: Lightweight three-factor authentication and key agreement protocol for Internet-integrated wireless sensor networks. IEEE Access 5, 3376–3392 (2017)
37.
go back to reference Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., Khan, M.K.: A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Networks 9(15), 2643–2655 (2016)CrossRef Li, X., Niu, J., Kumari, S., Liao, J., Liang, W., Khan, M.K.: A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity. Secur. Commun. Networks 9(15), 2643–2655 (2016)CrossRef
38.
go back to reference Peter, S.N., Vincent, O.N., Solomon, O.O.: Efficient authentication algorithm for secure remote access in wireless sensor networks. J. Comput. Sci. Res. 3(4), 43–50 (2021) Peter, S.N., Vincent, O.N., Solomon, O.O.: Efficient authentication algorithm for secure remote access in wireless sensor networks. J. Comput. Sci. Res. 3(4), 43–50 (2021)
39.
go back to reference Wu, F., Xu, L., Kumari, S., Li, X.: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of things security. J. Ambient. Intell. Humaniz. Comput. 8(1), 101–116 (2017)CrossRef Wu, F., Xu, L., Kumari, S., Li, X.: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of things security. J. Ambient. Intell. Humaniz. Comput. 8(1), 101–116 (2017)CrossRef
40.
go back to reference Adavoudi-Jolfaei, A., Ashouri-Talouki, M., Aghili, S.F.: Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-Peer Netw. Appl. 12(1), 43–59 (2019)CrossRef Adavoudi-Jolfaei, A., Ashouri-Talouki, M., Aghili, S.F.: Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks. Peer-Peer Netw. Appl. 12(1), 43–59 (2019)CrossRef
41.
go back to reference Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., Yang, Y.: An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J. Netw. Comput. Appl. 76, 37–48 (2016)CrossRef Jiang, Q., Ma, J., Wei, F., Tian, Y., Shen, J., Yang, Y.: An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J. Netw. Comput. Appl. 76, 37–48 (2016)CrossRef
42.
go back to reference Gope, P., Hwang, T.: A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 63(11), 7124–7132 (2016) Gope, P., Hwang, T.: A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 63(11), 7124–7132 (2016)
43.
go back to reference Chang, C.C., Le, H.D.: A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wireless Commun. 15(1), 357–366 (2016)MathSciNetCrossRef Chang, C.C., Le, H.D.: A provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks. IEEE Trans. Wireless Commun. 15(1), 357–366 (2016)MathSciNetCrossRef
44.
go back to reference Turkanović, M., Brumen, B., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Networks 20, 96–112 (2014) Turkanović, M., Brumen, B., Hölbl, M.: A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the internet of things notion. Ad Hoc Networks 20, 96–112 (2014)
45.
go back to reference Farash, M.S., Turkanović, M., Kumari, S., Hölbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Networks 36, 152–176 (2016) Farash, M.S., Turkanović, M., Kumari, S., Hölbl, M.: An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the internet of things environment. Ad Hoc Networks 36, 152–176 (2016)
46.
go back to reference Li, X., Peng, J., Obaidat, M.S., Wu, F., Khan, M.K., Chen, C.: A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst. J. 14(1), 39–50 (2019)CrossRef Li, X., Peng, J., Obaidat, M.S., Wu, F., Khan, M.K., Chen, C.: A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems. IEEE Syst. J. 14(1), 39–50 (2019)CrossRef
47.
go back to reference Xiong, L., Peng, D., Peng, T., Liang, H., Liu, Z.: A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors 17(11), 2681 (2017)CrossRef Xiong, L., Peng, D., Peng, T., Liang, H., Liu, Z.: A lightweight anonymous authentication protocol with perfect forward secrecy for wireless sensor networks. Sensors 17(11), 2681 (2017)CrossRef
48.
go back to reference Lu, Y., Xu, G., Li, L., Yang, Y.: Anonymous three-factor authenticated key agreement for wireless sensor networks. Wireless Netw. 25(4), 1461–1475 (2019)CrossRef Lu, Y., Xu, G., Li, L., Yang, Y.: Anonymous three-factor authenticated key agreement for wireless sensor networks. Wireless Netw. 25(4), 1461–1475 (2019)CrossRef
49.
go back to reference Das, A.K.: A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wireless Pers. Commun. 82(3), 1377–1404 (2015) Das, A.K.: A secure and efficient user anonymity-preserving three-factor authentication protocol for large-scale distributed wireless sensor networks. Wireless Pers. Commun. 82(3), 1377–1404 (2015)
Metadata
Title
Stochastic Security Ephemeral Generation Protocol for 5G Enabled Internet of Things
Authors
Mustafa A. Al Sibahee
Vincent Omollo Nyangaresi
Junchao Ma
Zaid Ameen Abduljabbar
Copyright Year
2022
DOI
https://doi.org/10.1007/978-3-030-95987-6_1

Premium Partner