Аннотации:
This research article provides an extensive analysis of novel methods of
cryptographic protection as well as advancements in authentication and
authorization techniques within cellular networks. The aim is to explore
recent literature and identify effective authentication and authorization
methods, including high-speed data encryption. The significance of this
study lies in the growing need for enhanced data security in scientific
research. Therefore, the focus is on identifying suitable authentication and
authorization schemes, including blockchain-based approaches for
distributed mobile cloud computing. The research methodology includes
observation, comparison, and abstraction, allowing for a comprehensive
examination of advanced encryption schemes and algorithms. Topics
covered in this article include multi-factor authentication, continuous
authentication, identity-based cryptography for vehicle-to-vehicle (V2V)
communication, secure blockchain-based authentication for fog computing,
internet of things (IoT) device mutual authentication, authentication for
wireless sensor networks based on blockchain, new secure authentication
schemes for standard wireless telecommunications networks, and the
security aspects of 4G and 5G cellular networks. Additionally, in the paper a
differentiated authentication mechanism for heterogeneous 6G networks
blockchain-based is discussed. The findings presented in this article hold
practical value for organizations involved in scientific research and
information security, particularly in encryption and protection of sensitive
data.