Abstract: The authentication process in fifth-generation networks between the user equipment and the network relies on secure communication protocols, with the 5G authentication and key agreement ...
Abstract: This article presents a lightweight and secure data communication protocol tailored for resource-constrained Internet of Things (IoT) environments. The proposed method integrates ...