Awaneesh Kumar
PhD
Indian Institute of Technology Roorkee, Roorkee (IITR), Uttarakhand, India
Publications
Service Migration Authentication Protocol for MEC
Multi-Access Edge Computing (MEC) is a novel edge computing paradigm that enhances the access level capacity of mobile networks by shifting the serviceable Data center
An improved and provably secure symmetric-key based 5G-AKA Protocol
One of the primary authentication mechanisms defined for the 5G system is the 5G-Authentication and Key Agreement (5G-AKA) protocol. It is set to be used in the
An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices
Several symmetric and asymmetric encryption based authentication protocols have been developed for the wireless local area networks (WLANs). However, recent findings reveal that these protocols
LEMAP: A Lightweight EAP based Mutual Authentication Protocol for IEEE 802.11 WLAN
The growing usage of wireless devices has significantly increased the need for Wireless Local Area Network (WLAN) during the past two decades. However, security (most
A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain
The next generation of mobile communication systems must be secured because of the ongoing entrance of numerous security attacks. Thus, to secure the underlying network,
Secure and user efficient eap-based authentication protocol for ieee 802.11 wireless lans
Wireless Local Area Networks (WLANs) have experienced significant growth in the last two decades due to the extensive use of wireless devices. Security (especially authentication)