Experimental Evaluation of Attacks on TESLA-Secured Time Synchronization Protocols.
Kristof TeichelGregor HildermeierPublished in: SSR (2018)
Keyphrases
- experimental evaluation
- security protocols
- cryptographic protocols
- countermeasures
- information security
- security flaws
- malicious attacks
- malicious users
- synthetic and real datasets
- terrorist attacks
- authentication protocol
- communication protocol
- communication protocols
- traffic analysis
- chosen plaintext
- digital watermarking
- watermarking technique
- security mechanisms
- watermarking scheme
- distributed systems