Open Access
Issue
EPJ Web Conf.
Volume 341, 2025
2nd International Conference on Advent Trends in Computational Intelligence and Communication Technologies (ICATCICT 2025)
Article Number 01038
Number of page(s) 9
DOI https://doi.org/10.1051/epjconf/202534101038
Published online 20 November 2025
  1. Ionescu, Constantin Aurelian, et. al. "The new era of business digitization through the implementation of 5G technology in Romania." Sustainability 13.23 (2021): 13401. [Google Scholar]
  2. Perakovic, Dragan, et. al. "Development and implementation possibilities of 5G in Industry 4.0." Design, Simulation, Manufacturing: The Innovation Exchange. Cham: Springer International Publishing, 2020. 166-175. [Google Scholar]
  3. Attaran, Mohsen. "The impact of 5G on the evolution of intelligent automation and industry digitization." Journal of ambient intelligence and humanized computing 14.5 (2023): 5977-5993. [Google Scholar]
  4. Rao, Sriganesh K., and Ramjee Prasad. "Impact of 5G technologies on industry 4.0." Wireless personal communications 100.1 (2018): 145-159. [Google Scholar]
  5. https://sqmagazine.co.uk/5g-statistics. [Google Scholar]
  6. Shafi, Mansoor, et. al. "5G: A tutorial overview of standards, trials, challenges, deployment, and practice." IEEE journal on selected areas in communications 35.6 (2017): 1201-1221. [Google Scholar]
  7. Salahdine, Fatima, Tao Han, and Ning Zhang. "Security in 5G and beyond recent advances and future challenges." Security and Privacy 6.1 (2023): e271. [Google Scholar]
  8. Edris, Ed Kamya Kiyemba, Mahdi Aiash, and Jonathan Loo. "Formalization and evaluation of EAP-AKA'protocol for 5G network access security." Array 16 (2022): 100254. [Google Scholar]
  9. Shi, Min, et. al. "A Formal Analysis of 5G EAP-TLS Protocol." IEEE Transactions on Networking (2025). [Google Scholar]
  10. You, Ilsun, et. al. "5G-AKA-FS: A 5G authentication and key agreement protocol for forward secrecy." Sensors 24.1 (2023): 159. [Google Scholar]
  11. Cheng, Ya-Chu, and Chung-An Shen. "A new tracking-attack scenario based on the vulnerability and privacy violation of 5G AKA protocol." IEEE Access 10 (2022): 77679-77687. [Google Scholar]
  12. Yue, Kaifeng, et. al. "A survey of decentralizing applications via blockchain: The 5G and beyond perspective." IEEE Communications Surveys & Tutorials 23.4 (2021): 2191-2217. [Google Scholar]
  13. Yazdinejad, A., Parizi, R. M., Dehghantanha, A., & Choo, K. K. R. (2019). Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks. IEEE Transactions on Network Science and Engineering, 8(2), 1120-1132. [Google Scholar]
  14. Haddad, Z. (2023). Blockchain-enabled anonymous mutual authentication and location privacy-preserving scheme for 5G networks. Journal of King Saud University-Computer and Information Sciences, 35(6), 101458. [Google Scholar]
  15. Goswami, B., & Choudhury, H. (2022). A blockchain-based authentication scheme for 5g-enabled iot. Journal of Network and Systems management, 30(4), 61. [Google Scholar]
  16. Feng, C., Liu, B., Guo, Z., Yu, K., Qin, Z., & Choo, K. K. R. (2021). Blockchain-based cross-domain authentication for intelligent 5G- enabled internet of drones. IEEE Internet of Things Journal, 9(8), 6224-6238. [Google Scholar]
  17. Ali, G., Ahmad, N., Cao, Y., Khan, S., Cruickshank, H., Qazi, E. A., & Ali, A. (2020). xDBAuth: Blockchain based cross domain authentication and authorization framework for Internet of Things. IEEE access, 8, 58800-58816. [Google Scholar]
  18. Wijethilaka, S., Yadav, A. K., Braeken, A., & Liyanage, M. (2024). Blockchain-based secure authentication and authorization framework for robust 5g network slicing. IEEE Transactions on Network and Service Management. [Google Scholar]
  19. Jangirala, S., Das, A. K., & Vasilakos, A. V. (2019). Designing secure lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment. IEEE Transactions on Industrial Informatics, 16(11), 7081-7093. [Google Scholar]
  20. He, D., Kumar, N., Chilamkurti, N., & Lee, J. H. (2014). Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. Journal of medical systems, 38, 1-6 [Google Scholar]
  21. Liao, Y. P., & Hsiao, C. M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad hoc networks, 18, 133-146. [Google Scholar]
  22. He, D., & Zeadally, S. (2014). An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE internet of things journal, 2(1), 72-83. [Google Scholar]
  23. Fan, K., Gong, Y., Liang, C., Li, H., & Yang, Y. (2016). Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Security and Communication Networks, 9(16), 3095-3104. [Google Scholar]
  24. Safkhani, M., & Shariat, M. (2018). Implementation of secret disclosure attack against two IoT lightweight authentication protocols. The Journal of Supercomputing, 74(11), 6220-6235. [Google Scholar]
  25. Sidorov, M., Ong, M. T., Sridharan, R. V., Nakamura, J., Ohmura, R., & Khor, J. H. (2019). Ultralightweight mutual authentication RFID protocol for blockchain enabled supply chains. IEEE Access, 7, 7273-7285. [CrossRef] [Google Scholar]
  26. Gao, Z., Zhang, D., Zhang, J., Liu, Z., Liu, H., & Zhao, M. (2022). Bc-aka: Blockchain based asymmetric authentication and key agreement protocol for distributed 5g core network. China Communications, 19(6), 66-76. [Google Scholar]
  27. Vivekanandan, M., VN, S., & U, S. R. (2021). BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology. Peer-to-Peer networking and applications, 14(1), 403- 419. [Google Scholar]
  28. Haddad, Z., Baza, M., Mahmoud, M. M., Alasmary, W., & Alsolami, F. (2021). Secure and efficient AKA scheme and uniform handover protocol for 5G network using blockchain. IEEE Open Journal of the Communications Society, 2, 2616-2627 [Google Scholar]
  29. Goswami, B., & Choudhury, H. (2024). A Secure and Fast Handover Authentication Scheme for 5G-Enabled IoT Using Blockchain Technology. Wireless Personal Communications, 138(4), 2155-2181. [Google Scholar]
  30. Haddad, Z. (2023). Blockchain-enabled anonymous mutual authentication and location privacy-preserving scheme for 5G networks. Journal of King Saud University-Computer and Information Sciences, 35(6), 101458. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.