36
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      General Multimedia Trust Authentication Framework for 5G Networks

      1 , 2 , 1 , 1
      Wireless Communications and Mobile Computing
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Due to the varieties of services and the openness of network architectures, great challenges for information security of the 5G systems are posed. Although there exist various and heterogeneous security communication mechanisms, it is imperative to develop a more general and more ubiquitous authentication method for data security. In this paper, we propose for the 5G networks a novel multimedia authentication framework, which is based upon the trusted content representation (TCR). The framework is general and suitable for various multimedia contents, e.g., text, audio, and video. The generality of the framework is achieved by the TCR technique, which authenticates the contents’ semantics in both high and low levels. Analysis shows that the authentication framework is able to authenticate multimedia contents effectively in terms of active and passive authenticating ways.

          Related collections

          Most cited references22

          • Record: found
          • Abstract: not found
          • Article: not found

          Safeguarding 5G wireless communication networks using physical layer security

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Design considerations for a 5G network architecture

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges

                Bookmark

                Author and article information

                Journal
                Wireless Communications and Mobile Computing
                Wireless Communications and Mobile Computing
                Hindawi Limited
                1530-8669
                1530-8677
                June 28 2018
                June 28 2018
                : 2018
                : 1-9
                Affiliations
                [1 ]School of Information Engineering, Henan University of Science and Technology, Luoyang, China
                [2 ]School of Information Engineering, Southwest University of Science and Technology, Mianyang, China
                Article
                10.1155/2018/8974802
                11e4b833-7a30-4ff1-9fa4-c6dc9c69b2e2
                © 2018

                http://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article