An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks
5th generation wireless systems are coming. While we are excited about the delay-free high speeds 5G will bring, security problems are becoming more and more serious. Increasingly rampant Distributed Denial of service (DDoS) attacks, particularly Distributed Reflection Denial of Service (DrDoS) atta...
Saved in:
| Published in | IEEE access Vol. 7; pp. 175970 - 175979 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
Piscataway
IEEE
2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2169-3536 2169-3536 |
| DOI | 10.1109/ACCESS.2019.2957565 |
Cover
| Abstract | 5th generation wireless systems are coming. While we are excited about the delay-free high speeds 5G will bring, security problems are becoming more and more serious. Increasingly rampant Distributed Denial of service (DDoS) attacks, particularly Distributed Reflection Denial of Service (DrDoS) attacks with User Datagram Protocols (UDPs) have developed into a global problem. This article presents a design, implementation, analysis, and experimental evaluation of an authentication scheme, a defense against UDP DrDoS attacks, by which attackers cleverly use rebound server farms to bounce a flood of packets to a target host. We call our solution IEWA because it combines the concepts of increasing expenses and weak authentication. In this paper, we apply IEWA to Network Time Protocol (NTP). First, we simulate and compare the original and improved protocols. Next, we verify the effectiveness of our proposed scheme. We show that our improved scheme is safer than the original scheme. Finally, we compare our solution with existing state-of-the-art schemes, using indicators such as communication overhead, server storage costs, client storage costs, computation costs of server and computation costs of client. We find that our scheme improves system stability and security, reduces communication overhead, server storage cost and computational costs. Our solution not only improves the NTP protocol to mitigate DrDoS attacks, but also strengthens other UDP protocols that are vulnerable to DrDoS attacks. Therefore, our solution can be used as a solution to UDP DrDoS attacks in 5G Networks. |
|---|---|
| AbstractList | 5th generation wireless systems are coming. While we are excited about the delay-free high speeds 5G will bring, security problems are becoming more and more serious. Increasingly rampant Distributed Denial of service (DDoS) attacks, particularly Distributed Reflection Denial of Service (DrDoS) attacks with User Datagram Protocols (UDPs) have developed into a global problem. This article presents a design, implementation, analysis, and experimental evaluation of an authentication scheme, a defense against UDP DrDoS attacks, by which attackers cleverly use rebound server farms to bounce a flood of packets to a target host. We call our solution IEWA because it combines the concepts of increasing expenses and weak authentication. In this paper, we apply IEWA to Network Time Protocol (NTP). First, we simulate and compare the original and improved protocols. Next, we verify the effectiveness of our proposed scheme. We show that our improved scheme is safer than the original scheme. Finally, we compare our solution with existing state-of-the-art schemes, using indicators such as communication overhead, server storage costs, client storage costs, computation costs of server and computation costs of client. We find that our scheme improves system stability and security, reduces communication overhead, server storage cost and computational costs. Our solution not only improves the NTP protocol to mitigate DrDoS attacks, but also strengthens other UDP protocols that are vulnerable to DrDoS attacks. Therefore, our solution can be used as a solution to UDP DrDoS attacks in 5G Networks. |
| Author | Hu, Liang Chu, Jianfeng Huang, Haiou Cheng, Xiaochun |
| Author_xml | – sequence: 1 givenname: Haiou orcidid: 0000-0002-3762-8614 surname: Huang fullname: Huang, Haiou organization: College of Computer Science and Technology, Jilin University, Changchun, China – sequence: 2 givenname: Liang orcidid: 0000-0003-0371-9646 surname: Hu fullname: Hu, Liang organization: College of Computer Science and Technology, Jilin University, Changchun, China – sequence: 3 givenname: Jianfeng surname: Chu fullname: Chu, Jianfeng email: chujf@jlu.edu.cn organization: College of Computer Science and Technology, Jilin University, Changchun, China – sequence: 4 givenname: Xiaochun surname: Cheng fullname: Cheng, Xiaochun email: x.cheng@mdx.ac.uk organization: Department of Computer Communications, Middlesex University, London, U.K |
| BookMark | eNptkV9LHDEUxUOxULV-Al8Cfd5t_kwyyeOwq1YqbWHrc8hk72jWMVmTLOK3b3RkKYuBkHC4v3NzT07QUYgBEDqnZE4p0d-7xeJitZozQvWcadEKKT6hY0alnnHB5dF_9y_oLOcNqUtVSbTH6GcXcLcr9xCKd7b4GPDK3cMj4BLxEgYIa9zdWR9ywbfLP3iZlnGFu1Kse8jYByyu8C8ozzE95K_o82DHDGfv5ym6vbz4u_gxu_l9db3obmauIarMKOkbXXc_rGnfcwe8B2CMamaJlNLJnleldeuhAUUHaXlPekKc5qzVlgA_RdeT7zrajdkm_2jTi4nWmzchpjtjUx1nBNMqLgVpq6WGBlxroWVCMaUIt41mrHo1k9cubO3Lsx3HvSEl5jVfY52DnM1rvuY934p9m7Btik87yMVs4i6FOrVhjRCy4ULwWqWnKpdizgkG43x5C7kk68d9h-kHDzvwA_bwXR9T5xPlAWBPqDqpVJr_A1YPpRY |
| CODEN | IAECCG |
| CitedBy_id | crossref_primary_10_3390_s24020691 crossref_primary_10_1016_j_jnca_2024_103828 crossref_primary_10_1145_3696446 crossref_primary_10_1016_j_iot_2022_100610 crossref_primary_10_1016_j_jksuci_2020_12_005 crossref_primary_10_32604_iasc_2022_022940 crossref_primary_10_1080_01969722_2022_2122002 |
| Cites_doi | 10.1109/ACCESS.2019.2923459 10.1109/ACCESS.2017.2719706 10.1016/j.comnet.2018.08.023 10.7763/JACN.2015.V3.155 10.1016/j.cose.2019.101604 10.1109/DISCEX.2001.932173 10.1109/ACCESS.2018.2826518 10.1109/PIMRC.2017.8292681 10.31209/2019.100000110 10.1109/HPCC-CSS-ICESS.2015.148 10.1016/j.adhoc.2019.02.001 10.1109/ICUMT.2012.6459796 10.1007/BFb0028465 10.1155/2019/4930908 10.17487/rfc4960 10.1109/MSPEC.2010.5397787 10.17487/rfc2522 10.17487/rfc0768 10.1145/1966913.1966955 10.1109/IWIA.2005.4 10.1145/1132026.1132027 10.1007/978-0-387-73821-5 10.1109/WCICSS.2015.7420333 10.14722/ndss.2014.23233 |
| ContentType | Journal Article |
| Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
| Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
| DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D ADTOC UNPAY DOA |
| DOI | 10.1109/ACCESS.2019.2957565 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Unpaywall for CDI: Periodical Content Unpaywall Directory of Open Access Journals (DOAJ) |
| DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Materials Research Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Xplore url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher – sequence: 3 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2169-3536 |
| EndPage | 175979 |
| ExternalDocumentID | oai_doaj_org_article_78365076b39e4ec7ae725828803a4922 10.1109/access.2019.2957565 10_1109_ACCESS_2019_2957565 8922689 |
| Genre | orig-research |
| GrantInformation_xml | – fundername: National Sci-Tech Support Plan of China grantid: 2014BAH02F00 – fundername: National Key Research and Development Plan of China grantid: 2017YFA0604500 |
| GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D RIG ADTOC UNPAY |
| ID | FETCH-LOGICAL-c408t-10b490b4bfd1bb3ce3bee22192a0666c6b33be7cdf4e81f6a3b0b00c93279a0e3 |
| IEDL.DBID | UNPAY |
| ISSN | 2169-3536 |
| IngestDate | Fri Oct 03 12:50:37 EDT 2025 Tue Aug 19 17:08:21 EDT 2025 Mon Jun 30 06:33:50 EDT 2025 Wed Oct 01 02:05:51 EDT 2025 Thu Apr 24 23:10:32 EDT 2025 Wed Aug 27 02:40:27 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | https://creativecommons.org/licenses/by/4.0/legalcode cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c408t-10b490b4bfd1bb3ce3bee22192a0666c6b33be7cdf4e81f6a3b0b00c93279a0e3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-3762-8614 0000-0003-0371-9646 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ielx7/6287639/8600701/08922689.pdf |
| PQID | 2455643553 |
| PQPubID | 4845423 |
| PageCount | 10 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_78365076b39e4ec7ae725828803a4922 proquest_journals_2455643553 crossref_primary_10_1109_ACCESS_2019_2957565 unpaywall_primary_10_1109_access_2019_2957565 ieee_primary_8922689 crossref_citationtrail_10_1109_ACCESS_2019_2957565 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20190000 2019-00-00 20190101 2019-01-01 |
| PublicationDateYYYYMMDD | 2019-01-01 |
| PublicationDate_xml | – year: 2019 text: 20190000 |
| PublicationDecade | 2010 |
| PublicationPlace | Piscataway |
| PublicationPlace_xml | – name: Piscataway |
| PublicationTitle | IEEE access |
| PublicationTitleAbbrev | Access |
| PublicationYear | 2019 |
| Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref13 ref12 ref14 ref10 lin (ref44) 2005; 28 (ref29) 2019 lukan (ref28) 2012 ref19 constantin (ref23) 2014 ref18 kaufman (ref42) 2014 ref50 (ref16) 2019 ref46 ref45 ref48 newman (ref15) 2018 ref47 garay (ref38) 2015 ref41 donner (ref26) 2013 ref49 schachter (ref8) 2018 ref7 (ref17) 2018 ref6 ref5 (ref22) 2017 dwork (ref36) 1992 burbank (ref24) 2010 ref35 ref34 mills (ref25) 2004 ref30 mazurczyk (ref43) 2006 ref33 juels (ref37) 1999 ref1 ref39 akamai’s (ref27) 2014 li (ref2) 0 gao (ref4) 2019; 20 boyd (ref31) 2013 aura (ref40) 0 ref20 yin (ref3) 2019 ref21 bacon (ref11) 2019 matsuura (ref32) 1998 ridhawi (ref9) 2008; 29 |
| References_xml | – ident: ref5 doi: 10.1109/ACCESS.2019.2923459 – ident: ref1 doi: 10.1109/ACCESS.2017.2719706 – ident: ref6 doi: 10.1016/j.comnet.2018.08.023 – ident: ref14 doi: 10.7763/JACN.2015.V3.155 – ident: ref50 doi: 10.1016/j.cose.2019.101604 – ident: ref46 doi: 10.1109/DISCEX.2001.932173 – ident: ref48 doi: 10.1109/ACCESS.2018.2826518 – year: 2006 ident: ref43 article-title: New security and control protocol for VoIP based on steganography and digital watermarking publication-title: arXiv cs/0602045 – start-page: 281 year: 2015 ident: ref38 article-title: The bitcoin backbone protocol: Analysis and applications publication-title: Proc Annu Int Conf Theory Appl Cryptograph Techn – year: 2017 ident: ref22 publication-title: CLDAP Reflection DDoS Threat Advisory – year: 2018 ident: ref17 publication-title: Verisign Distributed Denial of Service Trends Report Volume 5 Issue 1-1st Quarter – year: 2012 ident: ref28 – ident: ref10 doi: 10.1109/PIMRC.2017.8292681 – ident: ref47 doi: 10.31209/2019.100000110 – year: 2019 ident: ref16 publication-title: Full Year 2018 DDoS Trends Report – ident: ref34 doi: 10.1109/HPCC-CSS-ICESS.2015.148 – year: 2019 ident: ref29 publication-title: Stateless Protocol – start-page: 1 year: 2019 ident: ref3 article-title: QoS prediction for service recommendation with deep feature learning in edge computing environment publication-title: Mobile Netw Appl – start-page: 170 year: 0 ident: ref40 article-title: DoS-resistant authentication with client puzzles publication-title: Proc Int Workshop Secur Protocols – ident: ref13 doi: 10.1016/j.adhoc.2019.02.001 – year: 2014 ident: ref42 publication-title: Internet Key Exchange Protocol Version 2 (IKEv2) – year: 2004 ident: ref25 publication-title: Network Time Protocol (NTP) General Overview – year: 0 ident: ref2 article-title: A secure random key distribution scheme against node replication attacks in industrial wireless sensor systems publication-title: IEEE Trans Ind Informat – year: 2018 ident: ref8 publication-title: DDoS & 5G The bigger the Pipe the Stronger the Threat Allot Secure – ident: ref12 doi: 10.1109/ICUMT.2012.6459796 – start-page: 466 year: 1998 ident: ref32 article-title: Protection of authenticated key-agreement protocol against a Denial-of-service attack publication-title: Proc Int Symp Inf Theory and Its App (ISITA) – ident: ref30 doi: 10.1007/BFb0028465 – ident: ref7 doi: 10.1155/2019/4930908 – ident: ref49 doi: 10.17487/rfc4960 – year: 2010 ident: ref24 publication-title: Network Time Protocol Version 4 Protocol and Algorithms Specification – ident: ref19 doi: 10.1109/MSPEC.2010.5397787 – ident: ref41 doi: 10.17487/rfc2522 – volume: 20 start-page: 755 year: 2019 ident: ref4 article-title: Research on cost-driven services composition in an uncertain environment publication-title: J Internet Technol – volume: 28 start-page: 1943 year: 2005 ident: ref44 article-title: Stochastic modeling and evaluation for network security publication-title: Chin J Comput – year: 2014 ident: ref23 publication-title: Attackers use NTP Reflection in Huge DDoS Attack Computerworld – year: 2019 ident: ref11 publication-title: DDoS Attacks Among Top 5G Security Concerns TechTarget SearchSecurity – year: 2014 ident: ref27 publication-title: NTP-AMP Amplification Tactics And Analysis – ident: ref18 doi: 10.17487/rfc0768 – ident: ref33 doi: 10.1145/1966913.1966955 – ident: ref45 doi: 10.1109/IWIA.2005.4 – year: 2018 ident: ref15 article-title: 5G will increase DDoS attack risk publication-title: CORERO/Netw Secur Trends – ident: ref20 doi: 10.1145/1132026.1132027 – year: 2013 ident: ref31 publication-title: Protocols for Authentication and Key Establishment – start-page: 139 year: 1992 ident: ref36 article-title: Pricing via processing or combatting junk mail publication-title: Proc Annu Int Cryptol Conf Adv Cryptol – ident: ref39 doi: 10.1007/978-0-387-73821-5 – year: 2013 ident: ref26 publication-title: Prolexic Releases DNS Reflection Attack White Paper Popular Effective Distributed Reflection Denial of Service (DrDoS) Attacks Disrupt the Internet Domain Name System to Target Their Victims – volume: 29 year: 2008 ident: ref9 article-title: A collaborative mobile edge computing and user solution for service composition in 5G systems publication-title: Trans Emerg Telecommun Technol – ident: ref35 doi: 10.1109/WCICSS.2015.7420333 – start-page: 151 year: 1999 ident: ref37 article-title: Client puzzles: A cryptographic countermeasure against connection depletion attacks publication-title: Proc Network and Distributed System Security Symp (NDSS) – ident: ref21 doi: 10.14722/ndss.2014.23233 |
| SSID | ssj0000816957 |
| Score | 2.1930594 |
| Snippet | 5th generation wireless systems are coming. While we are excited about the delay-free high speeds 5G will bring, security problems are becoming more and more... |
| SourceID | doaj unpaywall proquest crossref ieee |
| SourceType | Open Website Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 175970 |
| SubjectTerms | 5G mobile communication Authentication Computer crime Computing costs Costs Denial of service attacks distributed reflection denial of service (DrDoS) Filtering IP networks network time protocol (NTP) Protocol (computers) Protocols Security Servers Systems stability user datagram protocol (UDP) Wireless networks |
| SummonAdditionalLinks | – databaseName: Directory of Open Access Journals (DOAJ) dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA7iRT2IT6yukoNHq2mSNsmx7vpAUQRd8BaSNBVhraIV8d87abtLRdCLh17SNExmJjNf0skMQvsWXHRGhYuJFDTmNGGxyayJCwLo2bCSu6ZqydV1dj7mF_fpfa_UV4gJa9MDt4w7CrcMALNklinPvRPGCxp-9UjCDFe0sb5Eqt5mqrHBMslUKro0QwlRR_lwCDMKsVzqkMKrNLiTnitqMvZ3JVa-oc2F9-rFfH6YyaTneE5X0HKHGHHeUrqK5ny1hpZ6eQTX0WVe4XDWFSJ_2iM4fAvCePK4fsYjX_qqwPmDeQQoiMejGzwC33KL87oOF-zxY4XTM3zdxoO_baDx6cnd8DzuqiTEjhNZgx21XMFjyyKxljnPrPcUDBE1YW_igHPQIlxRci-TEgRgCaw1B8BNKEM820Tz1XPltxAWHOBU5ri0acaFSyysduLKtCiZdMbICNEpw7TrUoiHShYT3WwliNItl3Xgsu64HKGD2UcvbQaN37sfB0nMuob0100DKIXulEL_pRQRWg9ynA0ioS2TKkKDqVx1t1TfNOUpzBZgF4tQPJP1D1JNU7_yG6nb_0HqDloMY7anOgM0X7---13AObXda1T6C-s38Sw priority: 102 providerName: Directory of Open Access Journals – databaseName: IEEE Electronic Library (IEL) dbid: RIE link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB61vQCH8iiogYJ84NhsE9uJ7WO621KBWiGVlXqzbMdBFUu2arOq4NczTrzRFhDiEClynMTWZ3s-j-cB8N6iiC6pcGkmBU05zVlqSmvSOkP2bFjDXZ-15PyiPJvzj1fF1RYcjr4w3vve-MxPwm1_ll8v3Sqoyo6kQrIg1TZsC1kOvlqjPiUkkFCFiIGF8kwdVdMp9iFYb6kJxUdFECAbwqeP0R-Tqjzgl49W7Y35cW8Wiw1Rc_oUzteNHCxMvk1WnZ24n7_Fb_zfXjyD3cg5STUMkuew5dsX8GQjEuEefKpaErRlwXZoUOKRS4Tzuyfdksx849uaVF_NNZJJMp99JjOUTpek6rrgok-uW1J8IBeDRfndS5ifnnyZnqUxz0LqeCY7XIktV3jZps6tZc4z6z3FpYyasLtxpWVYIlzdcC_zBiG0Gc5Wh9RPKJN59gp22mXr94EIjoSsdFzaouTC5RbXi8w1Rd0w6YyRCdA1ANrFIOQhF8ZC95uRTOkBNR1Q0xG1BA7Hl26GGBz_rn4ckB2rhgDafQGioON81MF5Bakwdk157p0wXtBwgigzZjgClMBeQG78SAQtgYP1ONFxst9pygvsLRI3lkA6jp0_mmr6DJgPmvr67395A49DrUHTcwA73e3Kv0Xu09l3_aD_BYMF_Gw priority: 102 providerName: IEEE |
| Title | An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks |
| URI | https://ieeexplore.ieee.org/document/8922689 https://www.proquest.com/docview/2455643553 https://ieeexplore.ieee.org/ielx7/6287639/8600701/08922689.pdf https://doaj.org/article/78365076b39e4ec7ae725828803a4922 |
| UnpaywallVersion | publishedVersion |
| Volume | 7 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: KQ8 dateStart: 20130101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: DOA dateStart: 20130101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2169-3536 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000816957 issn: 2169-3536 databaseCode: M~E dateStart: 20130101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pb9MwFLagOyAO_BqIjFH5wJGkju0k9jG0jAlENWlUGifLdpypomTVlooffz3Pjlt1ICHBIVJkOZGt79nvs_38PYReGXDRJa1sSkRFU05zlurS6LQhwJ41a7kNWUs-zsvTBX9_UVzEDbdwF8Y5F4LPXOZfw1n-0q2-V5OSevE0ORFeUZ3kEyIkUAchs3XT3kUHZQFcfIQOFvOz-rPPKJeXMmXhbPJFFNac6JCD0MdzyYxKICrepey5o6DaH9Os3GKc9zbdWv_4plerPedz8hCpbbOHmJMv2aY3mf35m6Lj__frEXoQeSmuB0N6jO647gm6v6dWeIg-1B32O2o-vmjY6MPnAPlXh_srPHOt6xpcX-olEE68mJ3hGXiwc1z3vb_Gj5cdLt7h-RB1fvMULU7efpqepjEXQ2o5ET3M1oZLeEzb5MYw65hxjsJ0R7VfAdnSMCipbNNyJ_IWYDYERrQFelhJTRx7hkbdVeeeI1xxIG2l5cIUJa9sbmBOIbYtmpYJq7VIEN1ComwUKvf5MlYqLFiIVPV0CtapPI4q4pig17uP1oNOx9-rv_FY76p6ke1QALioOGaVv-ACdBm6Jh13ttKuov6UURCmOYCUoEOP5e4nEbgEHW8tR8UJ4UZRXkBvgdyxBKU7a_qjqYOF3mrq0T_WP0aj_nrjXgJX6s047DGMw7XGcRwcvwDeIgyD |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fb9MwED6N8TB44NdABAb4gcelS2Inth9DyyhsrZC2SnuzbMeZJko6sVQI_nrOiRt1gBAPkaLETnz6bN_n8_kO4K1BFV1k3MaJ4FnMspTGujA6rhJkz5rWzHZZS2bzYrpgny7yix04HM7COOc65zM38rfdXn61smtvKjsSEsmCkHfgbs4Yy_vTWoNFxaeQkDkPoYXSRB6V4zFK4f235CjDV7lXIVvqp4vSH9Kq3GKYe-vmWv_4rpfLLWVz_BBmm2b2PiZfRuvWjOzP3yI4_q8cj-BBYJ2k7LvJY9hxzRO4vxWLcB9OyoZ4e5n3HurNeOQMAf3qSLsiE1e7piLlpb5COkkWk89kgvrpjJRt6w_pk6uG5B_IvPcpv3kKi-P35-NpHDItxJYlosW52DCJl6mr1BhqHTXOZTiZZdqvb2xhKD7htqqZE2mNIJoEx6tF8selThx9BrvNqnHPgXAEBmswYfKCcZsanDESW-dVTYXVWkSQbQBQNoQh99kwlqpbjiRS9agpj5oKqEVwOFS67qNw_Lv4O4_sUNSH0O4eIAoqjEjlj68gGUbRpGPOcu145vcQRUI1Q4Ai2PfIDR8JoEVwsOknKgz3G5WxHKVF6kYjiIe-80dTdZcD81ZTX_z9L29gb3o-O1WnH-cnL-Ger9HbfQ5gt_22dq-QCbXmdTcAfgHeCv-5 |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pb9MwFLagOyAO_BqIjIF84Ehax3YS-xhaxgSimjQqjZNlOy-oomQVSzXgr-c5casOJCQ4RIosJ7L1Pft9tp-_R8hLhy664KVPmSp5KnkmUls4m9YM2bMVjfR91pIP8-J0Id9d5Bdxw62_CwMAffAZjMNrf5a_hNX3clLwIJ6mJyooqrNswpRG6qD0eF03t8lBkSMXH5GDxfys-hQyymWFTkV_NvksCmtObJ-DMMRz6THXSFSCS9lzR71qf0yzcoNx3tm0a_vj2q5We87n5D4x22YPMSdfxpvOjf3P3xQd_79fD8i9yEtpNRjSQ3IL2kfk7p5a4SF5X7U07KiF-KJho4-eI-RfgXaXdAYNtDWtPtslEk66mJ3RGXqwc1p1XbjGT5ctzd_S-RB1fvWYLE7efJyepjEXQ-olUx3O1k5qfFxTZ84JD8IBcJzuuA0rIF84gSWlrxsJKmsQZsdwRHukh6W2DMQTMmovW3hKaCmRtBVeKpcXsvSZwzmF-SavG6G8tSohfAuJ8VGoPOTLWJl-wcK0qaZTtE4TcDQRx4S82n20HnQ6_l79dcB6VzWIbPcFiIuJY9aECy5Il7FrGiT40kLJwymjYsJKBCkhhwHL3U8icAk53lqOiRPCleEyx94iuRMJSXfW9EdTBwu90dSjf6x_TEbdtw08R67UuRdxQPwCWWAKjQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Authentication+Scheme+to+Defend+Against+UDP+DrDoS+Attacks+in+5G+Networks&rft.jtitle=IEEE+access&rft.au=Huang%2C+Haiou&rft.au=Hu%2C+Liang&rft.au=Chu%2C+Jianfeng&rft.au=Cheng%2C+Xiaochun&rft.date=2019&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=7&rft.spage=175970&rft.epage=175979&rft_id=info:doi/10.1109%2FACCESS.2019.2957565&rft.externalDocID=8922689 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |