IDEAS home Printed from https://ideas.repec.org/a/sae/intdis/v18y2022i10p15501329221126609.html
   My bibliography  Save this article

Survey on authentication and security protocols and schemes over 5G networks

Author

Listed:
  • Yahya Tashtoush
  • Dirar Darweesh
  • Ola Karajeh
  • Omar Darwish
  • Majdi Maabreh
  • Safa’ Swedat
  • Rawan Koraysh
  • Omar Almousa
  • Nasser Alsaedi

Abstract

The emergence of fifth generation networks opens the doors for Internet of Things environment to spread widely. The number of connected devices to fifth generation networks is expected to increase to more than 1.7 billion users by 2025. Each year, millions of modern devices go online at the beginning of the school year and after the holidays, and you can even notice the publicity of Internet of Things devices swinging with the seasons. Nowadays, these devices are considered to be very important to our daily life. That is because they provide power to our homes, organize our work operations and let communications more suitable. As a result of the increasing number of connected devices to fifth generation networks, the necessity to protect these Internet of Things devices against different types of cyber-attacks is also increased. For this reason, many researchers proposed different protocols and schemes to achieve the security of the Internet of Things devices. In this article, we introduce a survey of some protocols proposed by researchers in different domains and make a comparative study between them in terms of their category, authentication process, evaluation methodology, advantages, target, development year and applications within Internet of Things environment. The objective of this survey is to provide researchers with rich information about these protocols and their uses within Internet of Things systems, whether they can be used for cloud radio access networks, Internet of Things general purposes, telecommunications systems, e-healthcare systems or drone delivery service systems. It can also assist them in choosing the proper protocol to be used according to the type of their Internet of Things system.

Suggested Citation

  • Yahya Tashtoush & Dirar Darweesh & Ola Karajeh & Omar Darwish & Majdi Maabreh & Safa’ Swedat & Rawan Koraysh & Omar Almousa & Nasser Alsaedi, 2022. "Survey on authentication and security protocols and schemes over 5G networks," International Journal of Distributed Sensor Networks, , vol. 18(10), pages 15501329221, October.
  • Handle: RePEc:sae:intdis:v:18:y:2022:i:10:p:15501329221126609
    DOI: 10.1177/15501329221126609
    as

    Download full text from publisher

    File URL: https://journals.sagepub.com/doi/10.1177/15501329221126609
    Download Restriction: no

    File URL: https://libkey.io/10.1177/15501329221126609?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:sae:intdis:v:18:y:2022:i:10:p:15501329221126609. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: SAGE Publications (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.