{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:27:36Z","timestamp":1773329256588,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T00:00:00Z","timestamp":1630022400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T00:00:00Z","timestamp":1630022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11277-021-09036-4","type":"journal-article","created":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T01:02:36Z","timestamp":1630026156000},"page":"2925-2962","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["SEAI: Secrecy and Efficiency Aware Inter-gNB Handover Authentication and Key Agreement Protocol in 5G Communication Network"],"prefix":"10.1007","volume":"122","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9915-3183","authenticated-orcid":false,"given":"Shubham","family":"Gupta","sequence":"first","affiliation":[]},{"given":"Balu L.","family":"Parne","sequence":"additional","affiliation":[]},{"given":"Narendra S.","family":"Chaudhari","sequence":"additional","affiliation":[]},{"given":"Sandeep","family":"Saxena","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,27]]},"reference":[{"key":"9036_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jii.2018.01.005","volume":"10","author":"S Li","year":"2018","unstructured":"Li, S., Da Li, X., & Zhao, S. (2018). 5G internet of things: A survey. Journal of Industrial Information Integration, 10, 1\u20139.","journal-title":"Journal of Industrial Information Integration"},{"issue":"1","key":"9036_CR2","first-page":"181","volume":"22","author":"J Cao","year":"2019","unstructured":"Cao, J., Ma, M., Li, H., Ma, R., Yunqing Sun, P. Y., & Xiong, L. (2019). A survey on security aspects for 3GPP 5G networks. IEEE Communications Surveys & Tutorials, 22(1), 181\u2013186.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"9036_CR3","doi-asserted-by":"publisher","first-page":"106871","DOI":"10.1016\/j.comnet.2019.106871","volume":"162","author":"S Zhang","year":"2019","unstructured":"Zhang, S., Wang, Y., & Zhou, W. (2019). Towards secure 5G networks: A survey. Computer Networks, 162, 106871.","journal-title":"Computer Networks"},{"key":"9036_CR4","unstructured":"3GPP. (2018). 3GPP technical specification; security architecture and procedures for 5G system. https:\/\/www.etsi.org\/deliver\/etsi_ts\/133500_133599\/133501\/15.02.00_60\/ts_133501v150200p.pdf."},{"key":"9036_CR5","doi-asserted-by":"crossref","unstructured":"Zhang, X., Kunz, A., & Schr\u00f6der, S. (2017). Overview of 5G security in 3GPP. In IEEE conference on standards for communications and networking (CSCN) (pp. 181\u2013186).","DOI":"10.1109\/CSCN.2017.8088619"},{"issue":"3","key":"9036_CR6","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/COMST.2016.2532458","volume":"18","author":"M Agiwal","year":"2016","unstructured":"Agiwal, M., Roy, A., & Saxena, N. (2016). Next generation 5G wireless networks: A comprehensive survey. IEEE Communications Surveys & Tutorials, 18(3), 1617\u20131655.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"9036_CR7","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1007\/s11277-020-07446-4","volume":"114","author":"A Khanna","year":"2020","unstructured":"Khanna, A., & Kaur, S. (2020). Internet of things (IoT), applications and challenges: A comprehensive review. Wireless Personal Communications, 114, 1687\u20131762.","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"9036_CR8","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/s11277-020-07369-0","volume":"114","author":"I Ullah","year":"2020","unstructured":"Ullah, I., & Youn, H. Y. (2020). Intelligent data fusion for smart IoT environment: A survey. Wireless Personal Communications, 114(1), 409\u2013430.","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"9036_CR9","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1007\/s11277-017-4647-8","volume":"97","author":"SK Goudos","year":"2017","unstructured":"Goudos, S. K., Dallas, P. I., Chatziefthymiou, S., & Kyriazakos, S. (2017). A survey of IoT key enabling and future technologies: 5G, mobile IoT, sematic web and applications. Wireless Personal Communications, 97(2), 1645\u20131675.","journal-title":"Wireless Personal Communications"},{"key":"9036_CR10","doi-asserted-by":"publisher","first-page":"23022","DOI":"10.1109\/ACCESS.2020.2970118","volume":"8","author":"K Shafique","year":"2020","unstructured":"Shafique, K., Khawaja, B. A., Sabir, F., Qazi, S., & Mustaqim, M. (2020). Internet of things (IoT) for next-generation smart systems: A review of current challenges, future trends and prospects for emerging 5G-IoT scenarios. IEEE Access, 8, 23022\u201323040.","journal-title":"IEEE Access"},{"key":"9036_CR11","unstructured":"3GPP. (2020). 3GPP technical specification; security architecture and procedures for 5G system. https:\/\/www.etsi.org\/deliver\/etsi_ts\/133500_133599\/133501\/15.07.00_60\/ts_133501v150700p.pdf."},{"key":"9036_CR12","unstructured":"3GPP. (2020). 3GPP technical specification; security architecture and procedures for 5G system. Retrieved from https:\/\/www.etsi.org\/deliver\/etsi_ts\/133500_133599\/133501\/15.06.00_60\/ts_133501v150600p.pdf."},{"issue":"3","key":"9036_CR13","first-page":"1182","volume":"18","author":"J Cao","year":"2019","unstructured":"Cao, J., Ma, M., Fu, Y., Li, H., & Zhang, Y. (2019). Cppha: Capability-based privacy-protection handover authentication mechanism for SDN-based 5G HetNets. IEEE Transactions on Dependable and Secure Computing, 18(3), 1182\u20131195.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9036_CR14","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1016\/j.jnca.2017.11.004","volume":"102","author":"V Sharma","year":"2018","unstructured":"Sharma, V., You, I., Leu, F.-Y., & Atiquzzaman, M. (2018). Secure and efficient protocol for fast handover in 5G mobile Xhaul networks. Journal of Network and Computer Applications, 102, 38\u201357.","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"9036_CR15","doi-asserted-by":"publisher","first-page":"858","DOI":"10.1109\/TDSC.2019.2927664","volume":"18","author":"Y Zhang","year":"2019","unstructured":"Zhang, Y., Deng, R., Bertino, E., & Zheng, D. (2019). Robust and universal seamless handover authentication in 5G HetNets. IEEE Transactions on Dependable and Secure Computing, 18(2), 858\u2013874.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"9036_CR16","doi-asserted-by":"crossref","unstructured":"Han, K., Ma, M., Li, X., Feng, Z., & Hao, J. (2019). An efficient handover authentication mechanism for 5G wireless network. In IEEE wireless communications and networking conference (WCNC) (pp. 1\u20138).","DOI":"10.1109\/WCNC.2019.8885915"},{"issue":"3","key":"9036_CR17","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/j.dcan.2019.07.003","volume":"6","author":"A Kumar","year":"2019","unstructured":"Kumar, A., & Om, H. (2019). Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks. Digital Communications and Networks, 6(3), 341\u2013353.","journal-title":"Digital Communications and Networks"},{"key":"9036_CR18","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/ACCESS.2015.2461602","volume":"3","author":"A Gupta","year":"2015","unstructured":"Gupta, A., & Jha, R. K. (2015). A survey of 5G network: Architecture and emerging technologies. IEEE Access, 3, 1206\u20131232.","journal-title":"IEEE Access"},{"issue":"1","key":"9036_CR19","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MCOMSTD.2019.1800034","volume":"3","author":"HC Rudolph","year":"2019","unstructured":"Rudolph, H. C., Kunz, A., Iacono, L. L., & Nguyen, H. V. (2019). Security challenges of the 3GPP 5G service based architecture. IEEE Communications Standards Magazine, 3(1), 60\u201365.","journal-title":"IEEE Communications Standards Magazine"},{"key":"9036_CR20","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/s11277-020-07053-3","volume":"112","author":"J Parikh","year":"2020","unstructured":"Parikh, J., & Basu, A. (2020). Technologies assisting the paradigm shift from 4G to 5G. Wireless Personal Communications, 112, 481\u2013502.","journal-title":"Wireless Personal Communications"},{"key":"9036_CR21","unstructured":"3GPP. (2018). 3GPP technical specification; digital cellular telecommunications system (phase 2+) (GSM); universal mobile telecommunications system (UMTS); LTE; 3GPP system architecture evolution (SAE); security architecture. Retrieved from https:\/\/www.etsi.org\/deliver\/etsi_ts\/133400_133499\/133401\/14.06.00_60\/ts_133401v140600p.pdf."},{"issue":"1","key":"9036_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.icte.2017.03.007","volume":"3","author":"J Kim","year":"2017","unstructured":"Kim, J., Kim, D., & Choi, S. (2017). 3GPP SA2 architecture and functions for 5G mobile communication system. ICT Express, 3(1), 1\u20138.","journal-title":"ICT Express"},{"key":"9036_CR23","doi-asserted-by":"crossref","unstructured":"Arkko, J., Lehtovirta, V., & Eronen, P. (2009). Improved extensible authentication protocol method for 3rd generation authentication and key agreement (eap-aka\u2019). Network Working Group Request for Comments,5448, 1\u201329.","DOI":"10.17487\/rfc5448"},{"key":"9036_CR24","doi-asserted-by":"crossref","unstructured":"Miller, V. S. (1985). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (pp. 417\u2013426). Springer.","DOI":"10.1007\/3-540-39799-X_31"},{"issue":"1","key":"9036_CR25","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., & Vanstone, S. (2001). The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security, 1(1), 36\u201363.","journal-title":"International Journal of Information Security"},{"key":"9036_CR26","doi-asserted-by":"publisher","first-page":"1867","DOI":"10.1007\/s11277-020-07769-2","volume":"116","author":"S Majumder","year":"2020","unstructured":"Majumder, S., Ray, S., Sadhukhan, D., Khan, M. K., & Dasgupta, M. (2020). ECC-COAP: Elliptic curve cryptography based constraint application protocol for internet of things. Wireless Personal Communications, 116, 1867\u20131896.","journal-title":"Wireless Personal Communications"},{"key":"9036_CR27","doi-asserted-by":"crossref","unstructured":"Abdalla, M., & Pointcheval, D. (2005) Interactive Diffie\u2013Hellman assumptions with applications to password-based authentication. In International conference on financial cryptography and data security (pp. 341\u2013356). Springer.","DOI":"10.1007\/11507840_31"},{"issue":"2","key":"9036_CR28","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s11277-015-3139-y","volume":"93","author":"SA Chaudhry","year":"2017","unstructured":"Chaudhry, S. A., Farash, M. S., Naqvi, H., Islam, S. K. H., & Shon, T. (2017). A robust and efficient privacy aware handover authentication scheme for wireless networks. Wireless Personal Communications, 93(2), 311\u2013335.","journal-title":"Wireless Personal Communications"},{"key":"9036_CR29","unstructured":"AVISPA. (2005). AVISPA automated validation of internet security protocols. Retrieved from http:\/\/www.avispa-project.org."},{"issue":"4","key":"9036_CR30","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1007\/s11277-020-07304-3","volume":"113","author":"B Narwal","year":"2020","unstructured":"Narwal, B., & Mohapatra, A. K. (2020). Seemaka: Secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks. Wireless Personal Communications, 113(4), 1985\u20132008.","journal-title":"Wireless Personal Communications"},{"key":"9036_CR31","unstructured":"OPENSSL. (2018). OPENSSL-cryptography and SSL\/TLS toolkit. Technical report. Retrieved from https:\/\/www.openssl.org\/."},{"issue":"8","key":"9036_CR32","doi-asserted-by":"publisher","first-page":"e3934","DOI":"10.1002\/dac.3934","volume":"32","author":"S Gupta","year":"2019","unstructured":"Gupta, S., Parne, B. L., & Chaudhari, N. S. (2019). SRGH: A secure and robust group-based handover aka protocol for MTC in LTE-A networks. International Journal of Communication Systems, 32(8), e3934.","journal-title":"International Journal of Communication Systems"},{"issue":"1","key":"9036_CR33","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1007\/s11277-012-0828-7","volume":"71","author":"K-L Huang","year":"2013","unstructured":"Huang, K.-L., Chi, K.-H., Wang, J.-T., & Tseng, C.-C. (2013). A fast authentication scheme for WIMAX-WLAN vertical handover. Wireless Personal Communications, 71(1), 555\u2013575.","journal-title":"Wireless Personal Communications"},{"key":"9036_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-020-01702-8","volume":"2020","author":"KA Alezabi","year":"2020","unstructured":"Alezabi, K. A., Hashim, F., Hashim, S. J., Ali, B. M., & Jamalipour, A. (2020). Efficient authentication and re-authentication protocols for 4G\/5G heterogeneous networks. EURASIP Journal on Wireless Communications and Networking, 2020, 1\u201334.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"9036_CR35","volume-title":"Computer applications. Queueing systems","author":"L Kleinrock","year":"1976","unstructured":"Kleinrock, L. (1976). Computer applications. Queueing systems. Wiley."},{"key":"9036_CR36","doi-asserted-by":"crossref","unstructured":"Lee, J.-H., & Chung, T.-M. (2008). A traffic analysis of authentication methods for proxy mobile IPV6. In 2008 international conference on information security and assurance (ISA 2008) (pp. 512\u2013517). IEEE.","DOI":"10.1109\/ISA.2008.75"},{"key":"9036_CR37","doi-asserted-by":"crossref","unstructured":"Wang, W., & Akyildiz, I. F. (2000). Intersystem location update and paging schemes for multitier wireless networks. In Proceedings of the 6th annual international conference on mobile computing and networking (pp. 99\u2013109).","DOI":"10.1145\/345910.345928"},{"issue":"1","key":"9036_CR38","first-page":"1","volume":"1","author":"DW Carman","year":"2000","unstructured":"Carman, D. W., Kruus, P. S., & Matt, B. J. (2000). Constraints and approaches for distributed sensor network security (final). DARPA Project report, Cryptographic Technologies Group, Trusted Information System, NAI Labs, 1(1), 1\u201339.","journal-title":"DARPA Project report, Cryptographic Technologies Group, Trusted Information System, NAI Labs"},{"key":"9036_CR39","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.jnca.2015.06.022","volume":"59","author":"L Zhang","year":"2016","unstructured":"Zhang, L., Tang, S., & Zhu, S. (2016). An energy efficient authenticated key agreement protocol for SIP-based green VOIP networks. Journal of Network and Computer Applications, 59, 126\u2013133.","journal-title":"Journal of Network and Computer Applications"},{"key":"9036_CR40","doi-asserted-by":"crossref","unstructured":"Feeney, L.\u00a0M., & Nilsson, M. (2001). Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In Proceedings IEEE INFOCOM 2001. Conference on computer communications. Twentieth annual joint conference of the IEEE computer and communications society (Cat. No. 01CH37213) (vol.\u00a03, pp. 1548\u20131557).","DOI":"10.1109\/INFCOM.2001.916651"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09036-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09036-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09036-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T07:22:44Z","timestamp":1643613764000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09036-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,27]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["9036"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09036-4","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-262554\/v1","asserted-by":"object"}]},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,27]]},"assertion":[{"value":"16 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 August 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}