{"id":"https://openalex.org/W4285813878","doi":"https://doi.org/10.1109/iwcmc55113.2022.9824274","title":"Hybrid blockchain-based Authentication Handover and Flow Rule Validation for Secure Software Defined 5G HetNets","display_name":"Hybrid blockchain-based Authentication Handover and Flow Rule Validation for Secure Software Defined 5G HetNets","publication_year":2022,"publication_date":"2022-05-30","ids":{"openalex":"https://openalex.org/W4285813878","doi":"https://doi.org/10.1109/iwcmc55113.2022.9824274"},"language":"en","primary_location":{"id":"doi:10.1109/iwcmc55113.2022.9824274","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9824274","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082391124","display_name":"Asad Faraz Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Asad Faraz Khan","raw_affiliation_strings":["School Of Engineering and IT, University Of Technology Sydney,Sydney,Australia","School Of Engineering and IT, University Of Technology Sydney, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School Of Engineering and IT, University Of Technology Sydney,Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"School Of Engineering and IT, University Of Technology Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045431254","display_name":"Priyadarsi Nanda","orcid":"https://orcid.org/0000-0002-5748-155X"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Priyadarsi Nanda","raw_affiliation_strings":["School Of Engineering and IT, University Of Technology Sydney,Sydney,Australia","School Of Engineering and IT, University Of Technology Sydney, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"School Of Engineering and IT, University Of Technology Sydney,Sydney,Australia","institution_ids":["https://openalex.org/I114017466"]},{"raw_affiliation_string":"School Of Engineering and IT, University Of Technology Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I114017466"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5082391124"],"corresponding_institution_ids":["https://openalex.org/I114017466"],"apc_list":null,"apc_paid":null,"fwci":1.6112,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.81955133,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"223","last_page":"230"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10148","display_name":"Advanced MIMO Systems Optimization","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13918","display_name":"Advanced Data and IoT Technologies","score":0.9901000261306763,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8476802110671997},{"id":"https://openalex.org/keywords/handover","display_name":"Handover","score":0.7357410192489624},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6382253170013428},{"id":"https://openalex.org/keywords/heterogeneous-network","display_name":"Heterogeneous network","score":0.542312741279602},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4958747327327728},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4273113012313843},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.34630444645881653},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.3237464427947998},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.25787675380706787},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12537747621536255},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08918476104736328}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8476802110671997},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.7357410192489624},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6382253170013428},{"id":"https://openalex.org/C158207573","wikidata":"https://www.wikidata.org/wiki/Q5747224","display_name":"Heterogeneous network","level":4,"score":0.542312741279602},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4958747327327728},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4273113012313843},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.34630444645881653},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3237464427947998},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.25787675380706787},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12537747621536255},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08918476104736328}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwcmc55113.2022.9824274","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwcmc55113.2022.9824274","pdf_url":null,"source":{"id":"https://openalex.org/S4363605313","display_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 International Wireless Communications and Mobile Computing (IWCMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.4699999988079071,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1875550","https://openalex.org/W7034542","https://openalex.org/W8516564","https://openalex.org/W11229666","https://openalex.org/W9034678","https://openalex.org/W10829536","https://openalex.org/W13456058","https://openalex.org/W8324335","https://openalex.org/W1898568","https://openalex.org/W14728754"],"abstract_inverted_index":{"5G":[0,18,39],"networks":[1],"provide":[2],"high":[3,6,8],"data":[4],"rates,":[5],"bandwidth,":[7],"coverage,":[9],"and":[10,54,58,97,105,152],"low":[11],"latency":[12],"compared":[13,154],"to":[14,155],"4G":[15],"networks.":[16],"However,":[17],"includes":[19],"some":[20],"challenges":[21],"such":[22,47],"as":[23,48],"privacy,":[24],"network":[25,128],"management,":[26],"security.":[27,81],"To":[28],"overcome":[29],"these":[30],"issues,":[31],"we":[32],"propose":[33],"SDN-5G":[34],"HetNet":[35],"(Software":[36],"Defined":[37],"Network-based":[38],"Heterogeneous":[40],"network)":[41],"model":[42],"which":[43,130],"addresses":[44],"three":[45],"issues":[46],"handover":[49,143],"authentication,":[50],"flow":[51,114],"rule":[52],"validation,":[53],"hybrid":[55],"intrusion":[56],"detection":[57,141],"mitigation.":[59],"Authentication":[60,66],"is":[61,83,124],"performed":[62,84,125],"by":[63,85],"Bio-Signature":[64],"Validation":[65],"mechanism":[67],"for":[68,80,111],"validating":[69],"the":[70,77,86,108],"users.":[71],"User":[72,95],"credentials":[73],"are":[74,103,116],"stored":[75,106],"in":[76,107,138],"public":[78],"blockchain":[79,110],"Handover":[82],"Dual":[87],"Constraints":[88],"Chaotic":[89],"Radial":[90],"Movement":[91],"Optimization":[92],"algorithm":[93],"using":[94,118,126],"Entity":[96],"Access":[98],"Network":[99],"constraints.":[100],"Flow":[101],"rules":[102,115],"hashed":[104],"private":[109],"validation.":[112],"Also,":[113],"monitored":[117],"Hidden":[119],"Markov":[120],"Model":[121],"(HMM).":[122],"Simulation":[123],"NS-3.26":[127],"simulator,":[129],"demonstrates":[131],"our":[132],"proposed":[133],"work":[134],"achieves":[135],"better":[136],"performance":[137],"terms":[139],"of":[140],"accuracy,":[142],"delay,":[144,151],"switch":[145],"failure":[146],"rate,":[147,150],"packet":[148],"loss":[149],"throughput":[153],"other":[156],"state-of-the-art":[157],"works.":[158]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
