4 research outputs found

    Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study

    Get PDF
    This research article provides an extensive analysis of novel methods of cryptographic protection as well as advancements in authentication and authorization techniques within cellular networks. The aim is to explore recent literature and identify effective authentication and authorization methods, including high-speed data encryption. The significance of this study lies in the growing need for enhanced data security in scientific research. Therefore, the focus is on identifying suitable authentication and authorization schemes, including blockchain-based approaches for distributed mobile cloud computing. The research methodology includes observation, comparison, and abstraction, allowing for a comprehensive examination of advanced encryption schemes and algorithms. Topics covered in this article include multi-factor authentication, continuous authentication, identity-based cryptography for vehicle-to-vehicle (V2V) communication, secure blockchain-based authentication for fog computing, internet of things (IoT) device mutual authentication, authentication for wireless sensor networks based on blockchain, new secure authentication schemes for standard wireless telecommunications networks, and the security aspects of 4G and 5G cellular networks. Additionally, in the paper a differentiated authentication mechanism for heterogeneous 6G networks blockchain-based is discussed. The findings presented in this article hold practical value for organizations involved in scientific research and information security, particularly in encryption and protection of sensitive data

    Software System for Determining the Level of Reliability and Fault-Tolerance of Information Systems

    No full text
    This article is written about techniques how to determine the level of fault tolerance of Information Systems (IS). On the basis of the proposed methods and approach, a software system has been developed that makes it possible to determine the reliability of the operation of both individual components of the IS and the entire IS. The proposed approach makes it possible to consider several criteria with various ways of optimization. This makes this approach an effective and powerful tool for applying techniques on how to determine the fault tolerance of Information Systems and its components
    corecore