Enhancing cryptographic protection, authentication, and authorization in cellular networks: A comprehensive research study

3Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.

Abstract

This research article provides an extensive analysis of novel methods of cryptographic protection as well as advancements in authentication and authorization techniques within cellular networks. The aim is to explore recent literature and identify effective authentication and authorization methods, including high-speed data encryption. The significance of this study lies in the growing need for enhanced data security in scientific research. Therefore, the focus is on identifying suitable authentication and authorization schemes, including blockchain-based approaches for distributed mobile cloud computing. The research methodology includes observation, comparison, and abstraction, allowing for a comprehensive examination of advanced encryption schemes and algorithms. Topics covered in this article include multi-factor authentication, continuous authentication, identity-based cryptography for vehicle-to-vehicle (V2V) communication, secure blockchain-based authentication for fog computing, internet of things (IoT) device mutual authentication, authentication for wireless sensor networks based on blockchain, new secure authentication schemes for standard wireless telecommunications networks, and the security aspects of 4G and 5G cellular networks. Additionally, in the paper a differentiated authentication mechanism for heterogeneous 6G networks blockchain-based is discussed. The findings presented in this article hold practical value for organizations involved in scientific research and information security, particularly in encryption and protection of sensitive data.

Cite

CITATION STYLE

APA

Moldamurat, K., Seitkulov, Y., Atanov, S., Bakyt, M., & Yergaliyeva, B. (2024). Enhancing cryptographic protection, authentication, and authorization in cellular networks: A comprehensive research study. International Journal of Electrical and Computer Engineering, 14(1), 479–487. https://doi.org/10.11591/ijece.v14i1.pp479-487

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free