Cargando…

Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions

The evolution of 5G and 6G networks has enhanced the ability of massive IoT devices to provide real-time monitoring and interaction with the surrounding environment. Despite recent advances, the necessary security services, such as immediate and continuous authentication, high scalability, and cyber...

Descripción completa

Detalles Bibliográficos
Autores principales: Eledlebi, Khouloud, Alzubaidi, Ahmed Adel, Yeob Yeun, Chan, Damiani, Ernesto, Mateu, Victor, Al-Hammadi, Yousof
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9737460/
https://www.ncbi.nlm.nih.gov/pubmed/36501765
http://dx.doi.org/10.3390/s22239063