Smart City Gnosys

Smart city article details

Title Securing 5G Wireless Networks With Advanced Key Management And Authentication For Enhanced Data Protection
ID_Doc 47714
Authors Thirunavukkarasu V.; Senthil Kumar A.; Suresh G.; Suganyadevi K.
Year 2025
Published International Journal of Communication Systems, 38, 7
DOI http://dx.doi.org/10.1002/dac.70070
Abstract The deployment of 5G technology marks a significant milestone in wireless communication, offering unparalleled speed, low latency, and the capacity to connect billions of devices through the Internet of Things (IoT). However, these advancements introduce considerable security challenges due to the increased complexity and scale of 5G networks, as well as the growing threat landscape. This paper introduces a novel security framework for 5G networks, addressing these challenges with innovative cryptographic and authentication solutions. By integrating elliptic curve cryptography (ECC) with quantum-resistant algorithms, the framework ensures secure key management that is future-proof against emerging threats, including those posed by quantum computing. Furthermore, the hybrid multifactor authentication system, encompassing biometric verification, one-time passwords (OTPs), and mutual authentication, provides a robust defense mechanism against unauthorized access and identity spoofing. Simulation results using NS3 demonstrate the model's superior performance, achieving 99.5% accuracy and low latency of 200 ms, surpassing traditional methods in both security and efficiency. The framework is further designed to withstand common cyberattacks, including man-in-the-middle and replay attacks, ensuring robust protection for critical applications like IoT ecosystems, autonomous vehicles, and smart cities. This comprehensive approach not only enhances data protection and network security but also ensures scalability, adaptability, and energy efficiency, positioning the framework as a critical solution for next-generation communication systems and beyond. © 2025 John Wiley & Sons Ltd.
Author Keywords 5G networks; advanced key management; biometric authentication; data protection; elliptic curve cryptography (ECC); Internet of Things (IoT); multi-factor authentication; mutual authentication; network security; quantum-resistant algorithms


Similar Articles


Id Similarity Authors Title Published
4323 View0.902Chawla D.; Mehra P.S.A Roadmap From Classical Cryptography To Post-Quantum Resistant Cryptography For 5G-Enabled Iot: Challenges, Opportunities And SolutionsInternet of Things (Netherlands), 24 (2023)
16776 View0.868Pradeep S.; Karthikeyan A.; Kiruthika R.; Amala Nirmal Doss S.A.Cryptographically Enhanced Security For Aiot Devices In 5G NetworksAIoT: Artificial Intelligence of Things (2025)
47650 View0.866Alyami R.Y.Secure Iot Transmission In 6G Smart Cities: A Quantum-Resilient Hybrid Galois Field And Reed-Solomon ApproachJournal of Supercomputing, 81, 4 (2025)
35255 View0.859Singh Y.; Singh A.Lightweight Cryptography Approach For Multifactor Authentication In Internet Of ThingsMysuruCon 2022 - 2022 IEEE 2nd Mysore Sub Section International Conference (2022)
42432 View0.857Obaid A.H.; Al-Husseini K.A.O.; Al-Shareeda M.A.; Almaiah M.A.; Shehab R.Post-Quantum Secure Anonymous Authentication For Smart CitiesInternational Journal of Innovative Research and Scientific Studies, 8, 3 (2025)
38416 View0.856Alsaraira A.; Alabed S.; Saraereh O.Multi-Stage Cryptography Technique For Wireless NetworksTelkomnika (Telecommunication Computing Electronics and Control), 22, 3 (2024)
35244 View0.855Khalique A.; Siddiqui F.; Ahad M.A.; Hussain I.Lightweight Authentication For Iot Devices (Laid) In Sustainable Smart CitiesScientific Reports, 15, 1 (2025)