From: Securing communication by attribute-based authentication in HetNet used for medical applications
Type of network | Objective | Problem raised | Solution proposed | Features |
---|---|---|---|---|
HetNet [8] | To enhance PHY layer security (PLS). | Emphasis on secure downlink transmission. | Massive MIMO deployment significantly increases secrecy performance. | • Spectrum efficiency improves due to densely installed BSs. • BS having big array of antenna offers huge array gain to its authorized user. |
HetNet [9] | To enhance PLS. | Increasing security during transmission in wireless HetNet. | SLS and BLS are two transmission schemes taken within such system to boost PLS by using content properties of cached files. | • Artificial interference incorporated by SLS will resist Eve that may be removed by cache-enabled consumers. • Without cached file, eves can decode nothing in BLS. • SLS and BLS are successful in achieving huge security gain as compared to normal transmission. |
VANET [25] | To enhance PLS in vehicular network using reconfigurable intelligent surface (RIS). | To examine the average secrecy capacity of the system under consideration | Two vehicular network system models are presented that are RIS-based transmission: one is vehicle-to-vehicle interaction with source using access point and other one is in form of VANET with RIS-based relay installed on building. | • RIS technologies evolved as an essential model for smart radio environments where vast numbers of small, low-cost, and passive components replicate the event signal with an adaptive phase shift deprived of the need for a dedicated energy source. |
VANET [26] | To enhance effectiveness of rescues with safety assurance. | Computational latency and communication overhead is minimized. | ABE access control scheme. | • Keeps communication private, avoids collision attacks, and enables fine grained access control. • Privacy and reliability improved. |
VANET [27] | Collaborative transmission in VANET, when straight transmission between origin and target is not likely. | Make data transmission relays secure. | CP-ABE is utilized in proposed protocol as it offers encrypted access control approach. | • Suggested approach guarantees secrecy. • This approach depends on authentication of signature to guarantee the accuracy of delivered messages. |
VANET [28] | Secure billing protocol over ABE in vehicular cloud computing. | Safe communication protocols. | ABE is deployed to ensure access control depending on the services purchased. Hash chain methodology is used to allow a vehicle to buy a service by means of an electronic voucher that it must possess. | • Pseudonym methods are employed to protect identity of vehicles and their required services. • The suggested approach enables reliable billing attributes with lesser computational overhead for vehicular cloud computing. |
MANET [29] | To provide the DoS and intrusion detection system in MANETs that will be based on FSM. | DoS and intrusion issues in MANET. | ID-AODV protocol is suggested based on FSM. | • Detection systems are developed using the FSM principle for both attacks: packet dropping and sequence number’s duplication due to DoS and intrusion attack, respectively. • ID-AODV’s main technical features include network monitoring system, FSM, and attack detection model. |
BSN [30] | To guarantee the security and safety of information fused at the BSN coordinator. | Privacy of information. | KP-ABE is employed to guarantee privacy of information. | • KP-ABE offers easy and safe encryption over CP-ABE because KP-ABE is a lightweight encryption scheme. |
IoT [31] | To regulate the access to data. | Data protection in resource-limited systems. | CP-ABE using efficient pre-computation methods. | • The pre-computation method is extended to the CP-ABE encryption scheme that enables to reduce computational costs of encryption. • Reduce practical challenges in deployment of CP-ABE on resource-limited systems. |
Under-water wireless sensor network (UWSN) [32] | Design routing protocol for proficient communication between sensors and sinks in UWSN. | Efficient communication between sensors in UWSN. | RE-PBR protocol for UWSNs is presented. | • RE-PBR takes into account three factors to balance energy usage and effective message delivery namely link quality, depth, and residual energy. |