{"id":"https://openalex.org/W2946018107","doi":"https://doi.org/10.1109/tdsc.2019.2916593","title":"CPPHA: Capability-based Privacy-Protection Handover Authentication Mechanism for SDN-based 5G HetNets","display_name":"CPPHA: Capability-based Privacy-Protection Handover Authentication Mechanism for SDN-based 5G HetNets","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2946018107","doi":"https://doi.org/10.1109/tdsc.2019.2916593","mag":"2946018107"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2019.2916593","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2916593","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101850333","display_name":"Jin Cao","orcid":"https://orcid.org/0000-0003-1372-7252"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jin Cao","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071592220","display_name":"Maode Ma","orcid":"https://orcid.org/0000-0003-1438-7018"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Maode Ma","raw_affiliation_strings":["School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yulong Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yulong Fu","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024453724","display_name":"Hui Li","orcid":"https://orcid.org/0000-0001-8310-7169"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Li","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100629240","display_name":"Yinghui Zhang","orcid":"https://orcid.org/0000-0002-5764-3272"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yinghui Zhang","raw_affiliation_strings":["National Engineering Laboratory for Wireless Security, Xi'an University of Posts & Telecommunications, Xi'an, China","Westone Cryptologic Research Center, Beijing, P.R. China"],"affiliations":[{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xi'an University of Posts & Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing, P.R. China","institution_ids":["https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101850333"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":6.6731,"has_fulltext":false,"cited_by_count":89,"citation_normalized_percentile":{"value":0.9707059,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11458","display_name":"Advanced Wireless Communication Technologies","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9714999794960022,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8365156650543213},{"id":"https://openalex.org/keywords/heterogeneous-network","display_name":"Heterogeneous network","score":0.8064769506454468},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7662839293479919},{"id":"https://openalex.org/keywords/handover","display_name":"Handover","score":0.7186938524246216},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5852566957473755},{"id":"https://openalex.org/keywords/base-station","display_name":"Base station","score":0.5550767779350281},{"id":"https://openalex.org/keywords/mobility-management","display_name":"Mobility management","score":0.5060533881187439},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.41665640473365784},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4097867012023926},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.34698694944381714},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23631224036216736},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11707240343093872}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8365156650543213},{"id":"https://openalex.org/C158207573","wikidata":"https://www.wikidata.org/wiki/Q5747224","display_name":"Heterogeneous network","level":4,"score":0.8064769506454468},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7662839293479919},{"id":"https://openalex.org/C111852164","wikidata":"https://www.wikidata.org/wiki/Q1414679","display_name":"Handover","level":2,"score":0.7186938524246216},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5852566957473755},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.5550767779350281},{"id":"https://openalex.org/C2778555145","wikidata":"https://www.wikidata.org/wiki/Q4476379","display_name":"Mobility management","level":2,"score":0.5060533881187439},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.41665640473365784},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4097867012023926},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.34698694944381714},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23631224036216736},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11707240343093872}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2019.2916593","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2019.2916593","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G907388154","display_name":null,"funder_award_id":"No. 61772404, U1836203 and 61772391","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1541979851","https://openalex.org/W1978192090","https://openalex.org/W1987745894","https://openalex.org/W2007161848","https://openalex.org/W2009946676","https://openalex.org/W2010939995","https://openalex.org/W2027761877","https://openalex.org/W2029090942","https://openalex.org/W2046305882","https://openalex.org/W2056455477","https://openalex.org/W2056916045","https://openalex.org/W2099803980","https://openalex.org/W2112778826","https://openalex.org/W2119928092","https://openalex.org/W2123577501","https://openalex.org/W2125560635","https://openalex.org/W2171072531","https://openalex.org/W2195615353","https://openalex.org/W2291135260","https://openalex.org/W2581502984","https://openalex.org/W6632176017"],"related_works":["https://openalex.org/W2078003942","https://openalex.org/W2081505856","https://openalex.org/W2155806497","https://openalex.org/W2395800181","https://openalex.org/W2068884821","https://openalex.org/W2756697477","https://openalex.org/W2035117624","https://openalex.org/W2358912731","https://openalex.org/W2075351639","https://openalex.org/W2760405630"],"abstract_inverted_index":{"Ultra-dense":[0],"Heterogeneous":[1],"network":[2,56],"(HetNet)":[3],"technique":[4],"can":[5,124,158],"significantly":[6],"improve":[7],"wireless":[8],"link":[9],"quality,":[10],"spectrum":[11],"efficiency":[12],"and":[13,16,51,71,84,102,108,129,136,173],"system":[14],"capacity,":[15],"satisfy":[17],"different":[18,45,90],"requirements":[19],"for":[20,75],"coverage":[21],"in":[22,34,58,69,117,138],"hotspots,":[23],"which":[24],"has":[25],"been":[26],"viewed":[27],"as":[28],"one":[29],"of":[30,43,47,54,66,92],"the":[31,41,52,55,59,126,142,147,170,174,181],"key":[32,130],"technologies":[33],"fifth":[35],"Generation":[36],"(5G)":[37],"network.":[38],"Due":[39],"to":[40],"existence":[42],"many":[44],"types":[46,91],"base":[48,93],"stations":[49],"(BSs)":[50],"complexity":[53],"topology":[57],"5G":[60,78,119,139],"HetNets,":[61],"there":[62],"are":[63],"a":[64,110],"lot":[65],"new":[67],"challenges":[68],"security":[70,161,166],"mobility":[72],"management":[73],"aspects":[74],"this":[76,96],"multi-tier":[77],"architecture":[79],"including":[80,169],"insecure":[81],"access":[82],"points":[83],"potential":[85],"frequent":[86],"handovers":[87],"among":[88],"several":[89,165],"stations.":[94],"In":[95,179],"paper,":[97],"we":[98],"integrate":[99],"user":[100],"capability":[101],"Software":[103],"Defined":[104],"Network":[105],"(SDN)":[106],"technique,":[107],"propose":[109],"capability-based":[111],"privacy":[112],"protection":[113,162],"handover":[114,149],"authentication":[115,128,148],"mechanism":[116],"SDN-based":[118],"HetNets.":[120],"Our":[121],"proposed":[122,155],"scheme":[123,156,188],"achieve":[125],"mutual":[127],"agreement":[131],"between":[132],"User":[133],"Equipments":[134],"(UEs)":[135],"BSs":[137],"HetNets":[140],"at":[141],"same":[143],"time":[144],"largely":[145],"reduce":[146],"cost.":[150],"We":[151],"demonstrate":[152],"that":[153,186],"our":[154,187],"indeed":[157],"provide":[159],"robust":[160],"by":[163],"employing":[164],"analysis":[167],"methods":[168],"BAN":[171],"logic":[172],"formal":[175],"verification":[176],"tool":[177],"Scyther.":[178],"addition,":[180],"performance":[182],"evaluation":[183],"results":[184],"show":[185],"outperforms":[189],"other":[190],"existing":[191],"schemes.":[192]},"counts_by_year":[{"year":2025,"cited_by_count":19},{"year":2024,"cited_by_count":28},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":19},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":2}],"updated_date":"2026-03-25T23:56:10.502304","created_date":"2025-10-10T00:00:00"}
