Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Virtual Physical Security for Mobile Computing Devices

In this paper I have attempted to explain briefly, how enterprise security for Mobile Computing Devices can be achieved in organizations. Enterprise security plans must not only address the data security over the network but also the protection of data at rest on mobile devices like Laptop PCs, PDAs, and Smart phones. The inherent lack of physical access control on mobile devices creates specia...

متن کامل

CDMA Physical Layer Built-in Security Enhancement

Served as one of the most widely used wireless airlink interface, CDMA has been identified as a major technique for 3G wireless communications. The current IS-95 CDMA provides a near-satisfactory security solution to voice centric wireless communications, since generally each voice conversation only lasts a very short period of time. However, the security features provided by IS-95 CDMA are far...

متن کامل

An Authentication and Security Protocol for Mobile Computing

The main contributions of this paper are to analyze an authentication and key distribution protocol for mobile computing proposed by Beller Chang and Yacobi in and reveal two problems associated with their protocol to propose a new authentication and key distribution protocol that utilizes a broadcast channel in a mobile network A particularly interesting feature of the new proposal is that it ...

متن کامل

Reliable Distributed Authentication in Multi-Access Mobile Edge Computing

The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...

متن کامل

Enhancement of Node Authentication and Security in Mobile ADHOC Network

The wireless networks play major rule in networking field. Routing and mobility are the major problems in mobile ADHOC networks. These problems can be avoided using clustering based authentication of approaches. In these paper describes The implementations of secured node verification scheme that authenticates the true nodes to access network and detects attacker nodes and Q–LEACH based cluster...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2019

ISSN: 2169-3536

DOI: 10.1109/access.2019.2934122