An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks

5th generation wireless systems are coming. While we are excited about the delay-free high speeds 5G will bring, security problems are becoming more and more serious. Increasingly rampant Distributed Denial of service (DDoS) attacks, particularly Distributed Reflection Denial of Service (DrDoS) atta...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 7; pp. 175970 - 175979
Main Authors Huang, Haiou, Hu, Liang, Chu, Jianfeng, Cheng, Xiaochun
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN2169-3536
2169-3536
DOI10.1109/ACCESS.2019.2957565

Cover

Abstract 5th generation wireless systems are coming. While we are excited about the delay-free high speeds 5G will bring, security problems are becoming more and more serious. Increasingly rampant Distributed Denial of service (DDoS) attacks, particularly Distributed Reflection Denial of Service (DrDoS) attacks with User Datagram Protocols (UDPs) have developed into a global problem. This article presents a design, implementation, analysis, and experimental evaluation of an authentication scheme, a defense against UDP DrDoS attacks, by which attackers cleverly use rebound server farms to bounce a flood of packets to a target host. We call our solution IEWA because it combines the concepts of increasing expenses and weak authentication. In this paper, we apply IEWA to Network Time Protocol (NTP). First, we simulate and compare the original and improved protocols. Next, we verify the effectiveness of our proposed scheme. We show that our improved scheme is safer than the original scheme. Finally, we compare our solution with existing state-of-the-art schemes, using indicators such as communication overhead, server storage costs, client storage costs, computation costs of server and computation costs of client. We find that our scheme improves system stability and security, reduces communication overhead, server storage cost and computational costs. Our solution not only improves the NTP protocol to mitigate DrDoS attacks, but also strengthens other UDP protocols that are vulnerable to DrDoS attacks. Therefore, our solution can be used as a solution to UDP DrDoS attacks in 5G Networks.
AbstractList 5th generation wireless systems are coming. While we are excited about the delay-free high speeds 5G will bring, security problems are becoming more and more serious. Increasingly rampant Distributed Denial of service (DDoS) attacks, particularly Distributed Reflection Denial of Service (DrDoS) attacks with User Datagram Protocols (UDPs) have developed into a global problem. This article presents a design, implementation, analysis, and experimental evaluation of an authentication scheme, a defense against UDP DrDoS attacks, by which attackers cleverly use rebound server farms to bounce a flood of packets to a target host. We call our solution IEWA because it combines the concepts of increasing expenses and weak authentication. In this paper, we apply IEWA to Network Time Protocol (NTP). First, we simulate and compare the original and improved protocols. Next, we verify the effectiveness of our proposed scheme. We show that our improved scheme is safer than the original scheme. Finally, we compare our solution with existing state-of-the-art schemes, using indicators such as communication overhead, server storage costs, client storage costs, computation costs of server and computation costs of client. We find that our scheme improves system stability and security, reduces communication overhead, server storage cost and computational costs. Our solution not only improves the NTP protocol to mitigate DrDoS attacks, but also strengthens other UDP protocols that are vulnerable to DrDoS attacks. Therefore, our solution can be used as a solution to UDP DrDoS attacks in 5G Networks.
Author Hu, Liang
Chu, Jianfeng
Huang, Haiou
Cheng, Xiaochun
Author_xml – sequence: 1
  givenname: Haiou
  orcidid: 0000-0002-3762-8614
  surname: Huang
  fullname: Huang, Haiou
  organization: College of Computer Science and Technology, Jilin University, Changchun, China
– sequence: 2
  givenname: Liang
  orcidid: 0000-0003-0371-9646
  surname: Hu
  fullname: Hu, Liang
  organization: College of Computer Science and Technology, Jilin University, Changchun, China
– sequence: 3
  givenname: Jianfeng
  surname: Chu
  fullname: Chu, Jianfeng
  email: chujf@jlu.edu.cn
  organization: College of Computer Science and Technology, Jilin University, Changchun, China
– sequence: 4
  givenname: Xiaochun
  surname: Cheng
  fullname: Cheng, Xiaochun
  email: x.cheng@mdx.ac.uk
  organization: Department of Computer Communications, Middlesex University, London, U.K
BookMark eNptkV9LHDEUxUOxULV-Al8Cfd5t_kwyyeOwq1YqbWHrc8hk72jWMVmTLOK3b3RkKYuBkHC4v3NzT07QUYgBEDqnZE4p0d-7xeJitZozQvWcadEKKT6hY0alnnHB5dF_9y_oLOcNqUtVSbTH6GcXcLcr9xCKd7b4GPDK3cMj4BLxEgYIa9zdWR9ywbfLP3iZlnGFu1Kse8jYByyu8C8ozzE95K_o82DHDGfv5ym6vbz4u_gxu_l9db3obmauIarMKOkbXXc_rGnfcwe8B2CMamaJlNLJnleldeuhAUUHaXlPekKc5qzVlgA_RdeT7zrajdkm_2jTi4nWmzchpjtjUx1nBNMqLgVpq6WGBlxroWVCMaUIt41mrHo1k9cubO3Lsx3HvSEl5jVfY52DnM1rvuY934p9m7Btik87yMVs4i6FOrVhjRCy4ULwWqWnKpdizgkG43x5C7kk68d9h-kHDzvwA_bwXR9T5xPlAWBPqDqpVJr_A1YPpRY
CODEN IAECCG
CitedBy_id crossref_primary_10_3390_s24020691
crossref_primary_10_1016_j_jnca_2024_103828
crossref_primary_10_1145_3696446
crossref_primary_10_1016_j_iot_2022_100610
crossref_primary_10_1016_j_jksuci_2020_12_005
crossref_primary_10_32604_iasc_2022_022940
crossref_primary_10_1080_01969722_2022_2122002
Cites_doi 10.1109/ACCESS.2019.2923459
10.1109/ACCESS.2017.2719706
10.1016/j.comnet.2018.08.023
10.7763/JACN.2015.V3.155
10.1016/j.cose.2019.101604
10.1109/DISCEX.2001.932173
10.1109/ACCESS.2018.2826518
10.1109/PIMRC.2017.8292681
10.31209/2019.100000110
10.1109/HPCC-CSS-ICESS.2015.148
10.1016/j.adhoc.2019.02.001
10.1109/ICUMT.2012.6459796
10.1007/BFb0028465
10.1155/2019/4930908
10.17487/rfc4960
10.1109/MSPEC.2010.5397787
10.17487/rfc2522
10.17487/rfc0768
10.1145/1966913.1966955
10.1109/IWIA.2005.4
10.1145/1132026.1132027
10.1007/978-0-387-73821-5
10.1109/WCICSS.2015.7420333
10.14722/ndss.2014.23233
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
DOA
DOI 10.1109/ACCESS.2019.2957565
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Unpaywall for CDI: Periodical Content
Unpaywall
Directory of Open Access Journals (DOAJ)
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Materials Research Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Xplore
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
– sequence: 3
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2169-3536
EndPage 175979
ExternalDocumentID oai_doaj_org_article_78365076b39e4ec7ae725828803a4922
10.1109/access.2019.2957565
10_1109_ACCESS_2019_2957565
8922689
Genre orig-research
GrantInformation_xml – fundername: National Sci-Tech Support Plan of China
  grantid: 2014BAH02F00
– fundername: National Key Research and Development Plan of China
  grantid: 2017YFA0604500
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
RIG
ADTOC
UNPAY
ID FETCH-LOGICAL-c408t-10b490b4bfd1bb3ce3bee22192a0666c6b33be7cdf4e81f6a3b0b00c93279a0e3
IEDL.DBID UNPAY
ISSN 2169-3536
IngestDate Fri Oct 03 12:50:37 EDT 2025
Tue Aug 19 17:08:21 EDT 2025
Mon Jun 30 06:33:50 EDT 2025
Wed Oct 01 02:05:51 EDT 2025
Thu Apr 24 23:10:32 EDT 2025
Wed Aug 27 02:40:27 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-10b490b4bfd1bb3ce3bee22192a0666c6b33be7cdf4e81f6a3b0b00c93279a0e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-3762-8614
0000-0003-0371-9646
OpenAccessLink https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ielx7/6287639/8600701/08922689.pdf
PQID 2455643553
PQPubID 4845423
PageCount 10
ParticipantIDs doaj_primary_oai_doaj_org_article_78365076b39e4ec7ae725828803a4922
proquest_journals_2455643553
crossref_primary_10_1109_ACCESS_2019_2957565
unpaywall_primary_10_1109_access_2019_2957565
ieee_primary_8922689
crossref_citationtrail_10_1109_ACCESS_2019_2957565
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20190000
2019-00-00
20190101
2019-01-01
PublicationDateYYYYMMDD 2019-01-01
PublicationDate_xml – year: 2019
  text: 20190000
PublicationDecade 2010
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2019
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref14
ref10
lin (ref44) 2005; 28
(ref29) 2019
lukan (ref28) 2012
ref19
constantin (ref23) 2014
ref18
kaufman (ref42) 2014
ref50
(ref16) 2019
ref46
ref45
ref48
newman (ref15) 2018
ref47
garay (ref38) 2015
ref41
donner (ref26) 2013
ref49
schachter (ref8) 2018
ref7
(ref17) 2018
ref6
ref5
(ref22) 2017
dwork (ref36) 1992
burbank (ref24) 2010
ref35
ref34
mills (ref25) 2004
ref30
mazurczyk (ref43) 2006
ref33
juels (ref37) 1999
ref1
ref39
akamai’s (ref27) 2014
li (ref2) 0
gao (ref4) 2019; 20
boyd (ref31) 2013
aura (ref40) 0
ref20
yin (ref3) 2019
ref21
bacon (ref11) 2019
matsuura (ref32) 1998
ridhawi (ref9) 2008; 29
References_xml – ident: ref5
  doi: 10.1109/ACCESS.2019.2923459
– ident: ref1
  doi: 10.1109/ACCESS.2017.2719706
– ident: ref6
  doi: 10.1016/j.comnet.2018.08.023
– ident: ref14
  doi: 10.7763/JACN.2015.V3.155
– ident: ref50
  doi: 10.1016/j.cose.2019.101604
– ident: ref46
  doi: 10.1109/DISCEX.2001.932173
– ident: ref48
  doi: 10.1109/ACCESS.2018.2826518
– year: 2006
  ident: ref43
  article-title: New security and control protocol for VoIP based on steganography and digital watermarking
  publication-title: arXiv cs/0602045
– start-page: 281
  year: 2015
  ident: ref38
  article-title: The bitcoin backbone protocol: Analysis and applications
  publication-title: Proc Annu Int Conf Theory Appl Cryptograph Techn
– year: 2017
  ident: ref22
  publication-title: CLDAP Reflection DDoS Threat Advisory
– year: 2018
  ident: ref17
  publication-title: Verisign Distributed Denial of Service Trends Report Volume 5 Issue 1-1st Quarter
– year: 2012
  ident: ref28
– ident: ref10
  doi: 10.1109/PIMRC.2017.8292681
– ident: ref47
  doi: 10.31209/2019.100000110
– year: 2019
  ident: ref16
  publication-title: Full Year 2018 DDoS Trends Report
– ident: ref34
  doi: 10.1109/HPCC-CSS-ICESS.2015.148
– year: 2019
  ident: ref29
  publication-title: Stateless Protocol
– start-page: 1
  year: 2019
  ident: ref3
  article-title: QoS prediction for service recommendation with deep feature learning in edge computing environment
  publication-title: Mobile Netw Appl
– start-page: 170
  year: 0
  ident: ref40
  article-title: DoS-resistant authentication with client puzzles
  publication-title: Proc Int Workshop Secur Protocols
– ident: ref13
  doi: 10.1016/j.adhoc.2019.02.001
– year: 2014
  ident: ref42
  publication-title: Internet Key Exchange Protocol Version 2 (IKEv2)
– year: 2004
  ident: ref25
  publication-title: Network Time Protocol (NTP) General Overview
– year: 0
  ident: ref2
  article-title: A secure random key distribution scheme against node replication attacks in industrial wireless sensor systems
  publication-title: IEEE Trans Ind Informat
– year: 2018
  ident: ref8
  publication-title: DDoS & 5G The bigger the Pipe the Stronger the Threat Allot Secure
– ident: ref12
  doi: 10.1109/ICUMT.2012.6459796
– start-page: 466
  year: 1998
  ident: ref32
  article-title: Protection of authenticated key-agreement protocol against a Denial-of-service attack
  publication-title: Proc Int Symp Inf Theory and Its App (ISITA)
– ident: ref30
  doi: 10.1007/BFb0028465
– ident: ref7
  doi: 10.1155/2019/4930908
– ident: ref49
  doi: 10.17487/rfc4960
– year: 2010
  ident: ref24
  publication-title: Network Time Protocol Version 4 Protocol and Algorithms Specification
– ident: ref19
  doi: 10.1109/MSPEC.2010.5397787
– ident: ref41
  doi: 10.17487/rfc2522
– volume: 20
  start-page: 755
  year: 2019
  ident: ref4
  article-title: Research on cost-driven services composition in an uncertain environment
  publication-title: J Internet Technol
– volume: 28
  start-page: 1943
  year: 2005
  ident: ref44
  article-title: Stochastic modeling and evaluation for network security
  publication-title: Chin J Comput
– year: 2014
  ident: ref23
  publication-title: Attackers use NTP Reflection in Huge DDoS Attack Computerworld
– year: 2019
  ident: ref11
  publication-title: DDoS Attacks Among Top 5G Security Concerns TechTarget SearchSecurity
– year: 2014
  ident: ref27
  publication-title: NTP-AMP Amplification Tactics And Analysis
– ident: ref18
  doi: 10.17487/rfc0768
– ident: ref33
  doi: 10.1145/1966913.1966955
– ident: ref45
  doi: 10.1109/IWIA.2005.4
– year: 2018
  ident: ref15
  article-title: 5G will increase DDoS attack risk
  publication-title: CORERO/Netw Secur Trends
– ident: ref20
  doi: 10.1145/1132026.1132027
– year: 2013
  ident: ref31
  publication-title: Protocols for Authentication and Key Establishment
– start-page: 139
  year: 1992
  ident: ref36
  article-title: Pricing via processing or combatting junk mail
  publication-title: Proc Annu Int Cryptol Conf Adv Cryptol
– ident: ref39
  doi: 10.1007/978-0-387-73821-5
– year: 2013
  ident: ref26
  publication-title: Prolexic Releases DNS Reflection Attack White Paper Popular Effective Distributed Reflection Denial of Service (DrDoS) Attacks Disrupt the Internet Domain Name System to Target Their Victims
– volume: 29
  year: 2008
  ident: ref9
  article-title: A collaborative mobile edge computing and user solution for service composition in 5G systems
  publication-title: Trans Emerg Telecommun Technol
– ident: ref35
  doi: 10.1109/WCICSS.2015.7420333
– start-page: 151
  year: 1999
  ident: ref37
  article-title: Client puzzles: A cryptographic countermeasure against connection depletion attacks
  publication-title: Proc Network and Distributed System Security Symp (NDSS)
– ident: ref21
  doi: 10.14722/ndss.2014.23233
SSID ssj0000816957
Score 2.1930594
Snippet 5th generation wireless systems are coming. While we are excited about the delay-free high speeds 5G will bring, security problems are becoming more and more...
SourceID doaj
unpaywall
proquest
crossref
ieee
SourceType Open Website
Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 175970
SubjectTerms 5G mobile communication
Authentication
Computer crime
Computing costs
Costs
Denial of service attacks
distributed reflection denial of service (DrDoS)
Filtering
IP networks
network time protocol (NTP)
Protocol (computers)
Protocols
Security
Servers
Systems stability
user datagram protocol (UDP)
Wireless networks
SummonAdditionalLinks – databaseName: Directory of Open Access Journals (DOAJ)
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8QwEA7iRT2IT6yukoNHq2mSNsmx7vpAUQRd8BaSNBVhraIV8d87abtLRdCLh17SNExmJjNf0skMQvsWXHRGhYuJFDTmNGGxyayJCwLo2bCSu6ZqydV1dj7mF_fpfa_UV4gJa9MDt4w7CrcMALNklinPvRPGCxp-9UjCDFe0sb5Eqt5mqrHBMslUKro0QwlRR_lwCDMKsVzqkMKrNLiTnitqMvZ3JVa-oc2F9-rFfH6YyaTneE5X0HKHGHHeUrqK5ny1hpZ6eQTX0WVe4XDWFSJ_2iM4fAvCePK4fsYjX_qqwPmDeQQoiMejGzwC33KL87oOF-zxY4XTM3zdxoO_baDx6cnd8DzuqiTEjhNZgx21XMFjyyKxljnPrPcUDBE1YW_igHPQIlxRci-TEgRgCaw1B8BNKEM820Tz1XPltxAWHOBU5ri0acaFSyysduLKtCiZdMbICNEpw7TrUoiHShYT3WwliNItl3Xgsu64HKGD2UcvbQaN37sfB0nMuob0100DKIXulEL_pRQRWg9ynA0ioS2TKkKDqVx1t1TfNOUpzBZgF4tQPJP1D1JNU7_yG6nb_0HqDloMY7anOgM0X7---13AObXda1T6C-s38Sw
  priority: 102
  providerName: Directory of Open Access Journals
– databaseName: IEEE Electronic Library (IEL)
  dbid: RIE
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB61vQCH8iiogYJ84NhsE9uJ7WO621KBWiGVlXqzbMdBFUu2arOq4NczTrzRFhDiEClynMTWZ3s-j-cB8N6iiC6pcGkmBU05zVlqSmvSOkP2bFjDXZ-15PyiPJvzj1fF1RYcjr4w3vve-MxPwm1_ll8v3Sqoyo6kQrIg1TZsC1kOvlqjPiUkkFCFiIGF8kwdVdMp9iFYb6kJxUdFECAbwqeP0R-Tqjzgl49W7Y35cW8Wiw1Rc_oUzteNHCxMvk1WnZ24n7_Fb_zfXjyD3cg5STUMkuew5dsX8GQjEuEefKpaErRlwXZoUOKRS4Tzuyfdksx849uaVF_NNZJJMp99JjOUTpek6rrgok-uW1J8IBeDRfndS5ifnnyZnqUxz0LqeCY7XIktV3jZps6tZc4z6z3FpYyasLtxpWVYIlzdcC_zBiG0Gc5Wh9RPKJN59gp22mXr94EIjoSsdFzaouTC5RbXi8w1Rd0w6YyRCdA1ANrFIOQhF8ZC95uRTOkBNR1Q0xG1BA7Hl26GGBz_rn4ckB2rhgDafQGioON81MF5Bakwdk157p0wXtBwgigzZjgClMBeQG78SAQtgYP1ONFxst9pygvsLRI3lkA6jp0_mmr6DJgPmvr67395A49DrUHTcwA73e3Kv0Xu09l3_aD_BYMF_Gw
  priority: 102
  providerName: IEEE
Title An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks
URI https://ieeexplore.ieee.org/document/8922689
https://www.proquest.com/docview/2455643553
https://ieeexplore.ieee.org/ielx7/6287639/8600701/08922689.pdf
https://doaj.org/article/78365076b39e4ec7ae725828803a4922
UnpaywallVersion publishedVersion
Volume 7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: KQ8
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: DOA
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2169-3536
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000816957
  issn: 2169-3536
  databaseCode: M~E
  dateStart: 20130101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pb9MwFLagOyAO_BqIjFH5wJGkju0k9jG0jAlENWlUGifLdpypomTVlooffz3Pjlt1ICHBIVJkOZGt79nvs_38PYReGXDRJa1sSkRFU05zlurS6LQhwJ41a7kNWUs-zsvTBX9_UVzEDbdwF8Y5F4LPXOZfw1n-0q2-V5OSevE0ORFeUZ3kEyIkUAchs3XT3kUHZQFcfIQOFvOz-rPPKJeXMmXhbPJFFNac6JCD0MdzyYxKICrepey5o6DaH9Os3GKc9zbdWv_4plerPedz8hCpbbOHmJMv2aY3mf35m6Lj__frEXoQeSmuB0N6jO647gm6v6dWeIg-1B32O2o-vmjY6MPnAPlXh_srPHOt6xpcX-olEE68mJ3hGXiwc1z3vb_Gj5cdLt7h-RB1fvMULU7efpqepjEXQ2o5ET3M1oZLeEzb5MYw65hxjsJ0R7VfAdnSMCipbNNyJ_IWYDYERrQFelhJTRx7hkbdVeeeI1xxIG2l5cIUJa9sbmBOIbYtmpYJq7VIEN1ComwUKvf5MlYqLFiIVPV0CtapPI4q4pig17uP1oNOx9-rv_FY76p6ke1QALioOGaVv-ACdBm6Jh13ttKuov6UURCmOYCUoEOP5e4nEbgEHW8tR8UJ4UZRXkBvgdyxBKU7a_qjqYOF3mrq0T_WP0aj_nrjXgJX6s047DGMw7XGcRwcvwDeIgyD
linkProvider Unpaywall
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fb9MwED6N8TB44NdABAb4gcelS2Inth9DyyhsrZC2SnuzbMeZJko6sVQI_nrOiRt1gBAPkaLETnz6bN_n8_kO4K1BFV1k3MaJ4FnMspTGujA6rhJkz5rWzHZZS2bzYrpgny7yix04HM7COOc65zM38rfdXn61smtvKjsSEsmCkHfgbs4Yy_vTWoNFxaeQkDkPoYXSRB6V4zFK4f235CjDV7lXIVvqp4vSH9Kq3GKYe-vmWv_4rpfLLWVz_BBmm2b2PiZfRuvWjOzP3yI4_q8cj-BBYJ2k7LvJY9hxzRO4vxWLcB9OyoZ4e5n3HurNeOQMAf3qSLsiE1e7piLlpb5COkkWk89kgvrpjJRt6w_pk6uG5B_IvPcpv3kKi-P35-NpHDItxJYlosW52DCJl6mr1BhqHTXOZTiZZdqvb2xhKD7htqqZE2mNIJoEx6tF8selThx9BrvNqnHPgXAEBmswYfKCcZsanDESW-dVTYXVWkSQbQBQNoQh99kwlqpbjiRS9agpj5oKqEVwOFS67qNw_Lv4O4_sUNSH0O4eIAoqjEjlj68gGUbRpGPOcu145vcQRUI1Q4Ai2PfIDR8JoEVwsOknKgz3G5WxHKVF6kYjiIe-80dTdZcD81ZTX_z9L29gb3o-O1WnH-cnL-Ger9HbfQ5gt_22dq-QCbXmdTcAfgHeCv-5
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pb9MwFLagOyAO_BqIjIF84Ehax3YS-xhaxgSimjQqjZNlOy-oomQVSzXgr-c5casOJCQ4RIosJ7L1Pft9tp-_R8hLhy664KVPmSp5KnkmUls4m9YM2bMVjfR91pIP8-J0Id9d5Bdxw62_CwMAffAZjMNrf5a_hNX3clLwIJ6mJyooqrNswpRG6qD0eF03t8lBkSMXH5GDxfys-hQyymWFTkV_NvksCmtObJ-DMMRz6THXSFSCS9lzR71qf0yzcoNx3tm0a_vj2q5We87n5D4x22YPMSdfxpvOjf3P3xQd_79fD8i9yEtpNRjSQ3IL2kfk7p5a4SF5X7U07KiF-KJho4-eI-RfgXaXdAYNtDWtPtslEk66mJ3RGXqwc1p1XbjGT5ctzd_S-RB1fvWYLE7efJyepjEXQ-olUx3O1k5qfFxTZ84JD8IBcJzuuA0rIF84gSWlrxsJKmsQZsdwRHukh6W2DMQTMmovW3hKaCmRtBVeKpcXsvSZwzmF-SavG6G8tSohfAuJ8VGoPOTLWJl-wcK0qaZTtE4TcDQRx4S82n20HnQ6_l79dcB6VzWIbPcFiIuJY9aECy5Il7FrGiT40kLJwymjYsJKBCkhhwHL3U8icAk53lqOiRPCleEyx94iuRMJSXfW9EdTBwu90dSjf6x_TEbdtw08R67UuRdxQPwCWWAKjQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Authentication+Scheme+to+Defend+Against+UDP+DrDoS+Attacks+in+5G+Networks&rft.jtitle=IEEE+access&rft.au=Huang%2C+Haiou&rft.au=Hu%2C+Liang&rft.au=Chu%2C+Jianfeng&rft.au=Cheng%2C+Xiaochun&rft.date=2019&rft.pub=IEEE&rft.eissn=2169-3536&rft.volume=7&rft.spage=175970&rft.epage=175979&rft_id=info:doi/10.1109%2FACCESS.2019.2957565&rft.externalDocID=8922689
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon