Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS

    Hoonyong Park1, TaeGuen Kim1, Daniel Gerbi Duguma1, Jiyoon Kim2, Ilsun You2,*, Willy Susilo3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1145-1165, 2023, DOI:10.32604/csse.2023.032044

    Abstract Network operators are attempting many innovations and changes in 5G using self-organizing networks (SON). The SON operates on the measurement reports (MR), which are obtained from user equipment (UE) and secured against malware and userspace programs. However, the synchronization signal block that the UE relies on to measure the wireless environment configured by a base station is not authenticated. As a result, the UE will likely gauge the wrong wireless environment configured by a false base station (FBS) and transmit the corresponding MR to the serving base station, which poisons the data used for 5G SONs. Therefore, the serving base… More >

  • Open Access

    ARTICLE

    Multivariate Broadcast Encryption with Group Key Algorithm for Secured IoT

    M. Suresh Kumar1,*, T. Purosothaman2

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 925-938, 2023, DOI:10.32604/csse.2023.027315

    Abstract The expanding and ubiquitous availability of the Internet of Things (IoT) have changed everyone’s life easier and more convenient. Same time it also offers a number of issues, such as effectiveness, security, and excessive power consumption, which constitute a danger to intelligent IoT-based apps. Group managing is primarily used for transmitting and multi-pathing communications that are secured with a general group key and it can only be decrypted by an authorized group member. A centralized trustworthy system, which is in charge of key distribution and upgrades, is used to maintain group keys. To provide longitudinal access controls, Software Defined Network… More >

Displaying 1-10 on page 1 of 2. Per Page