A Zero-Trust Authentication Scheme With Access Control for 6G-Enabled IoT Environments
The sixth generation (6G) is the next generation of wireless communication technology, is not limited to cellular networks but can be used to provide better services in all areas of wireless communication, including vehicles, drones, and smart homes. However, these advancements in 6G technology requ...
Saved in:
| Main Authors: | Seunghwan Son, Deokkyu Kwon, Sangwoo Lee, Hyeokchan Kwon, Youngho Park |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10729236/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Blockchain-Based Secure Authentication Protocol for Fog-Enabled IoT Environments
by: Taehun Kim, et al.
Published: (2025-06-01) -
An Anonymous and Efficient Authentication Scheme with Conditional Privacy Preservation in Internet of Vehicles Networks
by: Chaeeon Kim, et al.
Published: (2024-11-01) -
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth
by: Shujiang Xu, et al.
Published: (2023-12-01) -
Deterministic Systems for Cryptographic Primitives Used in Security Models in Particular IoT Configurations
by: Dana Simian, et al.
Published: (2025-03-01) -
Efficient IoT User Authentication Protocol with Semi-Trusted Servers
by: Shunfang Hu, et al.
Published: (2025-03-01)