Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT-based applications
biblio
Security Vulnerabilities in Handover Authentication Mechanism of 5G Network
Submitted by aekwall on Mon, 11/16/2020 - 1:50pm
Resilient Security Architectures
IoT-based applications
key hierarchy
key resilience problem
message authentication
mobility management (mobile radio)
pre-authentication
pubcrawl
Resiliency
Internet of Things
secret keys
security counter-measures
security demands
security issues
security vulnerabilities
Security weakness
telecommunication security
Third Generation Partnership Project
communication entities
5G communication network
5G handover
5G handover key mechanism
5G handover security analysis
5G mobile communication
5g network
authentication
authentication complexity
3GPP
computer architecture
Fifth Generation mobile telecommunication technology
Handover
handover architecture
handover key mechanism
handover mechanism
inter-gNB handover
inter-gNB handover authentication mechanism