Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications
- PMID: 35035816
- PMCID: PMC8759874
- DOI: 10.1155/2022/2500377
Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications
Abstract
Authentication is a suitable form of restricting the network from different types of attacks, especially in case of fifth-generation telecommunication networks, especially in healthcare applications. The handover and authentication mechanism are one such type that enables mitigation of attacks in health-related services. In this paper, we model an evolutionary model that uses a fuzzy evolutionary model in maintaining the handover and key management to improve the performance of authentication in nanocore technology-based 5G networks. The model is designed in such a way that it minimizes the delays and complexity while authenticating the networks in 5G networks. The attacks are mitigated using an evolutionary model when it is trained with the relevant attack datasets, and the model is validated to mitigate the attacks. The simulation is conducted to test the efficacy of the model, and the results of simulation show that the proposed method is effective in improving the handling and authentication and mitigation against various types of attacks in mobile health applications.
Copyright © 2022 J. Divakaran et al.
Conflict of interest statement
There are no conflicts of interest.
Figures







References
-
- Aslam M. M., Du L., Zhang X., Chen Y., Ahmed Z., Qureshi B. Sixth generation (6G) cognitive radio network (CRN) application, requirements, security issues, and key challenges. Wireless Communications and Mobile Computing . 2021;2021:18. doi: 10.1155/2021/1331428.1331428 - DOI
-
- Wang Q., Cheng C., Zuo L. Analysis and improvement of a NTRU-based handover authentication scheme. IEEE Communications Letters . 2019;23(10):1692–1695. doi: 10.1109/lcomm.2019.2927204. - DOI
-
- Mohsan S. A. H., Amjad H. A comprehensive survey on hybrid wireless networks: practical considerations, challenges, applications and research directions. Optical and Quantum Electronics . 2021;53(9):1–56. doi: 10.1007/s11082-021-03141-1. - DOI
-
- Ranaweera P., Jurcut A. D., Liyanage M. Survey on multi-access edge computing security and privacy. IEEE Communications Surveys & Tutorials . 2021;23(2):1078–1124. doi: 10.1109/comst.2021.3062546. - DOI
-
- Zeng Y., Guang H., Li G. Attribute-based anonymous handover authentication protocol for wireless networks. Security and Communication Networks . 2018;2018:9. doi: 10.1155/2018/8470949.8470949 - DOI
MeSH terms
LinkOut - more resources
Full Text Sources
Medical