Designing an Enhanced User Authenticated Key Management Scheme for 6G-Based Industrial Applications

6Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In the Sixth Generation (6G) mobile system, the importance of security increases even more in the communication system. One of the potential technologies of 6G is the Network in a Box (NIB). The 6G-enabled NIB is a multi-generational, easily and quickly installable technology used for communication. It is based on both hardware and software. The main features of a 6G-enabled NIB include low latency and a high level of flexibility. In addition, it provides connectivity services to the applications used in unusual situations such as battlefields or natural disasters in the industry. However, most of the applications used in the 6G-enabled NIB are not appropriately secured. There are chances of several active and passive attacks due to the insecure channel. Therefore, a novel remote user authentication and key management scheme is presented in this paper. This scheme is the modified and improved version of UAKMS-NIB and is renamed as the improved User Authentication and Management Scheme to secure the 6G-enabled NIB (iUAKMS-NIB) that can be used in industrial applications. Hence, the proposed scheme provides the best security solution against the possible attacks on the 6G communication system. The analytical results show that the proposed scheme performs better compared to the existing schemes.

References Powered by Scopus

Differential power analysis

6015Citations
N/AReaders
Get full text

On the Security of Public Key Protocols

4292Citations
N/AReaders
Get full text

A Vision of 6G Wireless Systems: Applications, Trends, Technologies, and Open Research Problems

3034Citations
N/AReaders
Get full text

Cited by Powered by Scopus

BSDCE-IoV: Blockchain-Based Secure Data Collection and Exchange Scheme for IoV in 5G Environment

32Citations
N/AReaders
Get full text

LEAF-IIoT: Lightweight and Efficient Authentication Framework for the Industrial Internet of Things

8Citations
N/AReaders
Get full text

A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments

0Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Darman, I., Mahmood, M. K., Chaudhry, S. A., Khan, S. A., & Lim, H. (2022). Designing an Enhanced User Authenticated Key Management Scheme for 6G-Based Industrial Applications. IEEE Access, 10, 92774–92787. https://doi.org/10.1109/ACCESS.2022.3198642

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 3

75%

Professor / Associate Prof. 1

25%

Readers' Discipline

Tooltip

Computer Science 4

100%

Save time finding and organizing research with Mendeley

Sign up for free