{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:34:03Z","timestamp":1762522443042,"version":"3.37.3"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T00:00:00Z","timestamp":1589846400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T00:00:00Z","timestamp":1589846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11276-020-02368-2","type":"journal-article","created":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T14:19:16Z","timestamp":1589897956000},"page":"4657-4675","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Prediction-based secured handover authentication for mobile cloud computing"],"prefix":"10.1007","volume":"26","author":[{"given":"Walid I.","family":"Khedr","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8065-8977","authenticated-orcid":false,"given":"Khalid M.","family":"Hosny","sequence":"additional","affiliation":[]},{"given":"Marwa M.","family":"Khashaba","sequence":"additional","affiliation":[]},{"given":"Fathy A.","family":"Amer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,19]]},"reference":[{"issue":"1","key":"2368_CR1","first-page":"62","volume":"11","author":"P Ross","year":"2011","unstructured":"Ross, P. (2011). How to keep your head above the clouds: Changing ICT worker skill sets in a cloud computing environment. Employment Relations Record,11(1), 62.","journal-title":"Employment Relations Record"},{"key":"2368_CR2","doi-asserted-by":"crossref","unstructured":"Umair, S., Muneer, U., Zahoor, M. N., & Malik, A. W. (2015). Mobile computing: Issues and challenges. In 2015 12th international conference on high-capacity optical networks and enabling\/emerging technologies (HONET) (pp. 1\u20135). IEEE.","DOI":"10.1109\/HONET.2015.7395438"},{"key":"2368_CR3","doi-asserted-by":"crossref","unstructured":"Umair, S., Muneer, U., Zahoor, M. N., & Malik, A. W. (2016). Mobile cloud computing future trends and opportunities. In Managing and processing big data in cloud computing (p. 105).","DOI":"10.4018\/978-1-4666-9767-6.ch007"},{"key":"2368_CR4","unstructured":"Almorsy, M., Grundy, J., & M\u00fcller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107."},{"issue":"2","key":"2368_CR5","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MNET.2015.7064902","volume":"29","author":"JK Liu","year":"2015","unstructured":"Liu, J. K., Au, M. H., Susilo, W., Liang, K., Lu, R., & Srinivasan, B. (2015). Secure sharing and searching for real-time video data in mobile cloud. IEEE Network,29(2), 46\u201350.","journal-title":"IEEE Network"},{"key":"2368_CR6","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1016\/j.adhoc.2018.11.012","volume":"87","author":"R Ma","year":"2019","unstructured":"Ma, R., Cao, J., Feng, D., Li, H., Zhang, Y., & Lv, X. (2019). PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks. Ad Hoc Networks,87, 49\u201360.","journal-title":"Ad Hoc Networks"},{"key":"2368_CR7","volume-title":"Cloud computing: Implementation, management, and security","author":"JW Rittinghouse","year":"2016","unstructured":"Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: Implementation, management, and security. Boca Raton: CRC Press."},{"key":"2368_CR8","unstructured":"GPP (V 15.2.0 Release 15, 2017). TS 23.402, Architecture enhancements for non-3GPP accesses. In 3rd generation partnership project; technical specification group services and system aspects."},{"issue":"3","key":"2368_CR9","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/MCOM.2012.6163599","volume":"50","author":"T Taleb","year":"2012","unstructured":"Taleb, T., & Kunz, A. (2012). Machine type communications in 3GPP networks: Potential, challenges, and solutions. IEEE Communications Magazine,50(3), 178\u20131847.","journal-title":"IEEE Communications Magazine"},{"key":"2368_CR10","unstructured":"GPP (V 14.1.0, 2017). TS 24.312, access network discovery and selection function (ANDSF) management object (MO). In 3rd generation partnership project; technical specification group services and system aspects."},{"issue":"11","key":"2368_CR11","doi-asserted-by":"crossref","first-page":"1848","DOI":"10.1016\/j.comnet.2010.02.006","volume":"54","author":"X Yan","year":"2010","unstructured":"Yan, X., \u015eekercio\u011flu, Y. A., & Narayanan, S. (2010). A survey of vertical handover decision algorithms in Fourth Generation heterogeneous wireless networks. Computer Networks,54(11), 1848\u20131863.","journal-title":"Computer Networks"},{"key":"2368_CR12","doi-asserted-by":"crossref","unstructured":"Xenakis, D., Passas, N., Di Gregorio, L., & Verikoukis, C. (2011). A context-aware vertical handover framework towards energy-efficiency. In 2011 IEEE 73rd vehicular technology conference (VTC spring) (pp. 1\u20135). IEEE.","DOI":"10.1109\/VETECS.2011.5956630"},{"key":"2368_CR13","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.comnet.2014.10.024","volume":"76","author":"D Xenakis","year":"2015","unstructured":"Xenakis, D., Passas, N., Merakos, L., & Verikoukis, C. (2015). Advanced mobility management for reduced interference and energy consumption in the two-tier LTE-advanced network. Computer Networks,76, 90\u2013111.","journal-title":"Computer Networks"},{"issue":"1","key":"2368_CR14","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s11036-014-0533-8","volume":"20","author":"M Yang","year":"2015","unstructured":"Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications,20(1), 4\u201318.","journal-title":"Mobile Networks and Applications"},{"key":"2368_CR15","unstructured":"GPP (V 15.0.0 Release 15, 2018). TS 33.401, 3GPP system architecture evolution (SAE); Security architecture. In 3rd generation partnership project; technical specification group services and system aspects."},{"key":"2368_CR16","doi-asserted-by":"crossref","unstructured":"Abdo, J. B. B., Chaouchi, H., & Aoude, M. (2012). Ensured confidentiality authentication and key agreement protocol for EPS. In 2012 symposium on broadband networks and fast internet (RELABIRA) (pp. 73\u201377). IEEE.","DOI":"10.1109\/RELABIRA.2012.6235098"},{"key":"2368_CR17","unstructured":"Fu, J., Bertze, \u00c5., Da Silva, I. L., Kuivinen, F., & Wang, Y. (2016). Handover prediction using historical data. Google Patents."},{"key":"2368_CR18","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.future.2019.01.012","volume":"96","author":"X Xu","year":"2019","unstructured":"Xu, X., Xue, Y., Qi, L., Yuan, Y., Zhang, X., Umer, T., et al. (2019). An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles. Future Generation Computer Systems,96, 89\u2013100. https:\/\/doi.org\/10.1016\/j.future.2019.01.012.","journal-title":"Future Generation Computer Systems"},{"key":"2368_CR19","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01245-3","author":"Y Chen","year":"2019","unstructured":"Chen, Y., Deng, S., Ma, H., Yin, J. J. M. N., & Applications. (2019). Deploying data-intensive applications with multiple services components on edge. Mobile Networks and Applications. https:\/\/doi.org\/10.1007\/s11036-019-01245-3.","journal-title":"Mobile Networks and Applications"},{"issue":"1","key":"2368_CR20","first-page":"165","volume":"20","author":"C Wan","year":"2011","unstructured":"Wan, C., Hu, A., & Zhang, J. (2011). An elliptic curve based handoff authentication protocol for WLAN. Chinese Journal of Electronics, 20(1), 165\u2013169.","journal-title":"Chinese Journal of Electronics"},{"issue":"3","key":"2368_CR21","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.comcom.2010.02.031","volume":"34","author":"D He","year":"2011","unstructured":"He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications,34(3), 367\u2013374.","journal-title":"Computer Communications"},{"key":"2368_CR22","doi-asserted-by":"crossref","unstructured":"El Bouabidi, I., Daly, I., & Zarai, F. (2012). Secure handoff protocol in 3GPP LTE networks. In 2012 third international conference on communications and networking (ComNet) (pp. 1\u20136). IEEE.","DOI":"10.1109\/ComNet.2012.6217746"},{"issue":"1","key":"2368_CR23","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/LCOMM.2010.01.091607","volume":"14","author":"J Choi","year":"2010","unstructured":"Choi, J., & Jung, S. (2010). A handover authentication using credentials based on chameleon hashing. IEEE Communications Letters,14(1), 54\u201356.","journal-title":"IEEE Communications Letters"},{"issue":"1","key":"2368_CR24","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1109\/TWC.2010.01.081219","volume":"9","author":"G Yang","year":"2010","unstructured":"Yang, G., Huang, Q., Wong, D. S., & Deng, X. (2010). Universal authentication protocols for anonymous wireless communications. IEEE Transactions on Wireless Communications,9(1), 168\u2013174.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"2","key":"2368_CR25","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1109\/TWC.2010.120610.101018","volume":"10","author":"D He","year":"2011","unstructured":"He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications,10(2), 431\u2013436.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"2368_CR26","doi-asserted-by":"crossref","unstructured":"Nakanishi, T., & Funabiki, N. (2005). Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps. In International conference on the theory and application of cryptology and information security (pp. 533\u2013548). Springer.","DOI":"10.1007\/11593447_29"},{"issue":"2\u20133","key":"2368_CR27","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1504\/IJSN.2011.043668","volume":"6","author":"MJ Sharma","year":"2011","unstructured":"Sharma, M. J., & Leung, V. C. (2011). Improved IP multimedia subsystem authentication mechanism for 3G-WLAN networks. International Journal of Security and Networks,6(2\u20133), 90\u2013100.","journal-title":"International Journal of Security and Networks"},{"issue":"1","key":"2368_CR28","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1186\/2192-1962-2-16","volume":"2","author":"MJ Sharma","year":"2012","unstructured":"Sharma, M. J., & Leung, V. C. (2012). IP multimedia subsystem authentication protocol in LTE-heterogeneous networks. Human-Centric Computing and Information Sciences,2(1), 16.","journal-title":"Human-Centric Computing and Information Sciences"},{"issue":"1","key":"2368_CR29","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TWC.2011.110811.111240","volume":"11","author":"D He","year":"2012","unstructured":"He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications,11(1), 48\u201353.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"10","key":"2368_CR30","doi-asserted-by":"crossref","first-page":"3644","DOI":"10.1109\/TWC.2012.081612.112070","volume":"11","author":"J Cao","year":"2012","unstructured":"Cao, J., Ma, M., & Li, H. (2012). An uniform handover authentication between E-UTRAN and non-3GPP access networks. IEEE Transactions on Wireless Communications,11(10), 3644\u20133650.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"8","key":"2368_CR31","doi-asserted-by":"crossref","first-page":"2119","DOI":"10.1016\/j.comnet.2012.02.012","volume":"56","author":"J Cao","year":"2012","unstructured":"Cao, J., Li, H., Ma, M., Zhang, Y., & Lai, C. (2012). A simple and robust handover authentication between HeNB and eNB in LTE networks. Computer Networks,56(8), 2119\u20132131.","journal-title":"Computer Networks"},{"key":"2368_CR32","doi-asserted-by":"crossref","unstructured":"Sithirasenan, E., Ramezani, K., Kumar, S., & Muthukkumarasamy, V. (2013). EAP-CRA for WiMAX, WLAN and 4G LTE Interoperability. In Selected topics in WiMAX. InTech.","DOI":"10.5772\/54837"},{"issue":"1","key":"2368_CR33","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1109\/TIFS.2014.2366300","volume":"10","author":"JK Liu","year":"2015","unstructured":"Liu, J. K., Chu, C. K., Chow, S. S., Huang, X., Au, M. H., & Zhou, J. (2015). Time-bound anonymous authentication for roaming networks. IEEE Transactions on Information Forensics and Security,10(1), 178\u2013189.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"2368_CR34","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MNET.2015.7113232","volume":"29","author":"D He","year":"2015","unstructured":"He, D., Chan, S., & Guizani, M. (2015). Handover authentication for mobile networks: Security and efficiency aspects. IEEE Network,29(3), 96\u2013103.","journal-title":"IEEE Network"},{"key":"2368_CR35","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/j.comnet.2015.11.014","volume":"94","author":"FB Degefa","year":"2016","unstructured":"Degefa, F. B., Lee, D., Kim, J., Choi, Y., & Won, D. (2016). Performance and security enhanced authentication and key agreement protocol for SAE\/LTE network. Computer Networks,94, 145\u2013163.","journal-title":"Computer Networks"},{"issue":"4","key":"2368_CR36","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/s11235-018-0446-0","volume":"69","author":"V Odelu","year":"2018","unstructured":"Odelu, V., Zeadally, S., Das, A. K., Wazid, M., & He, D. (2018). A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks. Telecommunication Systems, 69(4), 431\u2013445.","journal-title":"Telecommunication Systems"},{"issue":"7","key":"2368_CR37","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1109\/TMC.2013.134","volume":"13","author":"HJ Jo","year":"2014","unstructured":"Jo, H. J., Paik, J. H., & Lee, D. H. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing,13(7), 1469\u20131481.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"2368_CR38","doi-asserted-by":"crossref","unstructured":"Wang, G., Sun, Y., He, Q., Xin, G., & Wang, B. (2018). A content auditing method of IPsec VPN. In 2018 IEEE third international conference on data science in cyberspace (DSC) (pp. 634\u2013639). IEEE.","DOI":"10.1109\/DSC.2018.00101"},{"key":"2368_CR39","doi-asserted-by":"crossref","unstructured":"Yusof, A. L., Ya\u2019acob, N., & Ali, M. T. (2013). Hysteresis margin for handover in long term evolution (LTE) network. In 2013 international conference on computing, management and telecommunications (ComManTel) (pp. 426\u2013430). IEEE.","DOI":"10.1109\/ComManTel.2013.6482433"},{"key":"2368_CR40","doi-asserted-by":"crossref","unstructured":"Khan, M., & Han, K. (2014). An optimized network selection and handover triggering scheme for heterogeneous self-organized wireless networks. Mathematical Problems in Engineering, 2014.","DOI":"10.1155\/2014\/173068"},{"key":"2368_CR41","doi-asserted-by":"crossref","unstructured":"Luo, Y., Tran, P. N., An, C., Eymann, J., Kreft, L., & Timm-Giel, A. (2013). A novel handover prediction scheme in content centric networking using nonlinear autoregressive exogenous model. In 2013 IEEE 77th vehicular technology conference (VTC spring) (pp. 1\u20135). IEEE.","DOI":"10.1109\/VTCSpring.2013.6691837"},{"key":"2368_CR42","doi-asserted-by":"crossref","unstructured":"Bae, S. J., Chung, M. Y., & So, J. (2011). Handover triggering mechanism based on IEEE 802.21 in heterogeneous networks with LTE and WLAN. In 2011 international conference on information networking (ICOIN) (pp. 399\u2013403). IEEE.","DOI":"10.1109\/ICOIN.2011.5723117"},{"issue":"4","key":"2368_CR43","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1109\/SURV.2009.090405","volume":"11","author":"A Sgora","year":"2009","unstructured":"Sgora, A., & Vergados, D. D. (2009). Handoff prioritization and decision schemes in wireless cellular networks: A survey. IEEE Communications Surveys & Tutorials,11(4), 57\u201377.","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"11\u201312","key":"2368_CR44","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1007\/s12243-016-0505-z","volume":"71","author":"DMF Mattos","year":"2016","unstructured":"Mattos, D. M. F., & Duarte, O. C. M. B. (2016). AuthFlow: Authentication and access control mechanism for software defined networking. Annals of Telecommunications,71(11\u201312), 607\u2013615.","journal-title":"Annals of Telecommunications"},{"key":"2368_CR45","doi-asserted-by":"crossref","unstructured":"Gulati, S., Sharma, S., & Agarwal, G. (2018). The hidden truth anonymity in cyberspace: Deep web. In Intelligent computing and information and communication (pp. 719\u2013730). Springer.","DOI":"10.1007\/978-981-10-7245-1_70"},{"issue":"7","key":"2368_CR46","doi-asserted-by":"crossref","first-page":"2394","DOI":"10.3390\/s18072394","volume":"18","author":"G Xu","year":"2018","unstructured":"Xu, G., Qiu, S., Ahmad, H., Xu, G., Guo, Y., Zhang, M., et al. (2018). A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography. Sensors,18(7), 2394.","journal-title":"Sensors"},{"issue":"7","key":"2368_CR47","doi-asserted-by":"publisher","first-page":"2165","DOI":"10.1007\/s11276-016-1277-0","volume":"23","author":"A Fu","year":"2017","unstructured":"Fu, A., Qin, N., Wang, Y., Li, Q., & Zhang, G. J. W. N. (2017). Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE\/LTE-A networks. Wireless Networks,23(7), 2165\u20132176. https:\/\/doi.org\/10.1007\/s11276-016-1277-0.","journal-title":"Wireless Networks"},{"key":"2368_CR48","doi-asserted-by":"crossref","unstructured":"El Idrissi, Y. E. H., Zahid, N., & Jedra, M. (2012). Security analysis of 3GPP (LTE)\u2014WLAN interworking and a new local authentication method based on EAP-AKA. In 2012 international conference on future generation communication technology (FGCT) (pp. 137\u2013142). IEEE.","DOI":"10.1109\/FGCT.2012.6476561"},{"issue":"3","key":"2368_CR49","doi-asserted-by":"crossref","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","volume":"18","author":"M Conti","year":"2016","unstructured":"Conti, M., Dragoni, N., & Lesyk, V. (2016). A survey of man in the middle attacks. IEEE Communications Surveys & Tutorials,18(3), 2027\u20132051.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"2368_CR50","doi-asserted-by":"crossref","unstructured":"Mo, Y., & Sinopoli, B. (2009). Secure control against replay attacks. In 47th annual Allerton conference on communication, control, and computing, 2009. Allerton 2009 (pp. 911\u2013918). IEEE.","DOI":"10.1109\/ALLERTON.2009.5394956"},{"key":"2368_CR51","unstructured":"Na, S., Hwang, D. Y., Shin, W., & Kim, K.-H. (2017). Scenario and countermeasure for replay attack using join request messages in LoRaWAN. In 2017 international conference on information networking (ICOIN) (pp. 718\u2013720). IEEE."},{"key":"2368_CR52","unstructured":"Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K. (2012). Computer security: Principles and practice: Pearson Education, ISBN 0273764497."},{"key":"2368_CR53","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jpdc.2015.11.004","volume":"89","author":"Y Zhu","year":"2016","unstructured":"Zhu, Y., Huang, Z., & Takagi, T. (2016). Secure and controllable k-NN query over encrypted cloud data with key confidentiality. Journal of Parallel and Distributed Computing,89, 1\u201312.","journal-title":"Journal of Parallel and Distributed Computing"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02368-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-020-02368-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-020-02368-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T23:29:32Z","timestamp":1621380572000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-020-02368-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,19]]},"references-count":53,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["2368"],"URL":"https:\/\/doi.org\/10.1007\/s11276-020-02368-2","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2020,5,19]]},"assertion":[{"value":"19 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}