{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T19:27:08Z","timestamp":1768418828505,"version":"3.49.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030705718","type":"print"},{"value":"9783030705725","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-70572-5_7","type":"book-chapter","created":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T07:03:53Z","timestamp":1614755033000},"page":"99-118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["ANN-FL Secure Handover Protocol for 5G and Beyond Networks"],"prefix":"10.1007","author":[{"given":"Vincent O.","family":"Nyangaresi","sequence":"first","affiliation":[]},{"given":"Anthony J.","family":"Rodrigues","sequence":"additional","affiliation":[]},{"given":"Silvance O.","family":"Abeka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,4]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"147029","DOI":"10.1109\/ACCESS.2020.3015289","volume":"8","author":"LU Khan","year":"2020","unstructured":"Khan, L.U., Yaqoob, I., Imran, M., Han, Z., Hong, C.S.: 6G wireless systems: a vision, architectural elements, and future directions. IEEE Access 8, 147029\u2013147044 (2020)","journal-title":"IEEE Access"},{"key":"7_CR2","unstructured":"Sabuzima, N., Ripon P.: 6G: envisioning the key issues and challenges. arXiv, pp. 1\u20138 (2020)"},{"issue":"3","key":"7_CR3","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MVT.2019.2921208","volume":"14","author":"Z Zhang","year":"2019","unstructured":"Zhang, Z., et al.: 6G wireless networks: vision, requirements, architecture, and key technologies. IEEE Veh. Technol. Mag. 14(3), 28\u201341 (2019)","journal-title":"IEEE Veh. Technol. Mag."},{"issue":"2","key":"7_CR4","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/TWC.2018.2889465","volume":"18","author":"AJ Mahbas","year":"2019","unstructured":"Mahbas, A.J., Zhu, H., Wang, J.: Impact of small cells overlapping on mobility management. IEEE Trans. Wireless Commun. 18(2), 1054\u20131068 (2019)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"7_CR5","unstructured":"Alican, O., Maode, M.: Secure and efficient vertical handover authentication for 5G HetNets. In: 2018 IEEE International Conference on Information Communication and Signal Processing (ICICSP), pp. 27\u201332. IEEE (2018)"},{"key":"7_CR6","unstructured":"Rabe, A., Hesham, E., Sameh, S., Tareq, Y., Mohamed, A.: Handover management in dense cellular networks: a stochastic geometry approach. ArXiv, pp. 1\u20137 (2016)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Yazdinejad, A., Parizi, R.M., Dehghantanha, A., Choo, K.K.R.: Blockchain-enabled authentication handover with efficient privacy protection in SDN-based 5G networks. IEEE Trans. Netw. Sci. Eng. 1\u201312 (2019)","DOI":"10.1109\/TNSE.2019.2937481"},{"issue":"12","key":"7_CR8","doi-asserted-by":"publisher","first-page":"5436","DOI":"10.1109\/TII.2018.2858142","volume":"14","author":"S Hu","year":"2018","unstructured":"Hu, S., et al.: Non-orthogonal interleave-grid multiple access scheme for industrial Internet of Things in 5G network. IEEE Trans. Industr. Inf. 14(12), 5436\u20135446 (2018)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MNET.2017.1600301","volume":"17","author":"T Bilen","year":"2017","unstructured":"Bilen, T., Berk, C., Kaushik, R.C.: Handover management in software-defined ultra-dense 5G networks. IEEE Network 17, 49\u201355 (2017)","journal-title":"IEEE Network"},{"issue":"3","key":"7_CR10","first-page":"341","volume":"6","author":"K Amit","year":"2019","unstructured":"Amit, K., Hari, O.: Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks. Digit. Commun. Netw. 6(3), 341\u2013353 (2019)","journal-title":"Digit. Commun. Netw."},{"key":"7_CR11","unstructured":"Basaras, P., Belikaidis, I., Maglaras, L., Katsaros, D.: Blocking epidemic propagation in vehicular networks. In: 2016 12th Annual Conference on Wireless On-Demand Network Systems and Services (WONS), pp. 1\u20138. IEEE (2016)"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.phycom.2015.10.006","volume":"18","author":"N Panwar","year":"2016","unstructured":"Panwar, N., Sharma, S., Singh, A.: A survey on 5G: the next generation of mobile communication. Phys. Commun. 18, 64\u201384 (2016)","journal-title":"Phys. Commun."},{"issue":"6","key":"7_CR13","first-page":"934","volume":"5","author":"A Babiker","year":"2016","unstructured":"Babiker, A., Ahmmed, H., Ali, S.: Comparative study 1st, 2nd, 3rd, 4th, generations from handoff aspects. Int. J. Sci. Res. 5(6), 934\u2013941 (2016)","journal-title":"Int. J. Sci. Res."},{"issue":"17","key":"7_CR14","first-page":"1","volume":"32","author":"G Amina","year":"2018","unstructured":"Amina, G., Faouzi, Z., Mahmoud, N.: SDN\/NFV-based handover management approach for ultradense 5G mobile networks. Int. J. Commun. Syst. 32(17), 1\u20135 (2018)","journal-title":"Int. J. Commun. Syst."},{"issue":"1","key":"7_CR15","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1016\/j.future.2017.03.031","volume":"79","author":"X Li","year":"2018","unstructured":"Li, X., Liu, F., Feng, Z., Xu, G., Fu, F.: A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems. Future Gener. Comput. Syst. 79(1), 417\u2013430 (2018)","journal-title":"Future Gener. Comput. Syst."},{"issue":"6","key":"7_CR16","doi-asserted-by":"publisher","first-page":"1737","DOI":"10.18576\/amis\/110621","volume":"11","author":"S Sendhilnathan","year":"2017","unstructured":"Sendhilnathan, S., Phemina, M.: Minimizing handover delay and maximizing throughput by heterogeneous handover algorithm (HHA) in telecommunication networks. Appl. Math. Inf. Sci. 11(6), 1737\u20131746 (2017)","journal-title":"Appl. Math. Inf. Sci."},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Azzali, F., Ghazali, O., Omar, M.H.: Fuzzy logic-based intelligent scheme for enhancing QoS of vertical handover decision in vehicular ad-hoc networks. In: IOP Conference Series: Materials Science and Engineering, vol. 226, no.1, pp. 012\u2013081, IOP Publishing (2017)","DOI":"10.1088\/1757-899X\/226\/1\/012081"},{"key":"7_CR18","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1007\/978-981-13-8618-3_71","volume-title":"Intelligent Communication, Control and Devices","author":"P Kene","year":"2020","unstructured":"Kene, P., Haridas, S.L.: Reducing ping-pong effect in heterogeneous wireless networks using machine learning. In: Choudhury, S., Mishra, R., Mishra, R.G., Kumar, A. (eds.) Intelligent Communication, Control and Devices. AISC, vol. 989, pp. 697\u2013705. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-13-8618-3_71"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Alezabi, K., Hashim, F., Hashim, S., Ali, B.: An efficient authentication and key agreement protocol for 4G (LTE) networks. In: Region 10 Symposium, pp. 502\u2013507. IEEE (2014)","DOI":"10.1109\/TENCONSpring.2014.6863085"},{"issue":"4","key":"7_CR20","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MCOM.2017.1600893","volume":"55","author":"Y Ku","year":"2017","unstructured":"Ku, Y., et al.: 5G radio access network design with the fog paradigm: confluence of communications and computing. IEEE Commun. Mag. 55(4), 46\u201352 (2017)","journal-title":"IEEE Commun. Mag."},{"key":"7_CR21","unstructured":"Jamal, F.A, Firudin, K.M.: Direction prediction assisted handover using the multilayer perception neural network to reduce the handover time delays in LTE networks. In: 9th International Conference on Theory and Application of Soft Computing, Computing with Words and Perception, vol. 120, pp. 719\u2013727 (2017). Procedia Computer Science"},{"issue":"11","key":"7_CR22","doi-asserted-by":"publisher","first-page":"9689","DOI":"10.1109\/TVT.2017.2750167","volume":"66","author":"C Jin","year":"2017","unstructured":"Jin, C., Maode, M., Hui, L.: G2RHA: group-to-route handover authentication scheme for 4G LTE-a high speed rail networks. IEEE Trans. Veh. Technol. 66(11), 9689\u20139701 (2017)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Mahmoud, E.O., Mohamed, H.M., Hassan,, A.: Design and simulation of a new intelligent authentication for handover over 4G (LTE) mobile communication network. In: The International Conference on Electrical Engineering, vol. 11, pp. 1\u201312. Military Technical College (2018)","DOI":"10.21608\/iceeng.2018.30166"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Towards new e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-70572-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T07:04:10Z","timestamp":1619766250000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-70572-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030705718","9783030705725"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-70572-5_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"4 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICOMM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on e-Infrastructure and e-Services for Developing Countries","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Eb\u00e8ne","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mauritius","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africom2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/africommconference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfyPlus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"89","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to COVID-19 pandemic the conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}