SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks.
Chitra JavaliGirish RevadigarLavy LibmanSanjay JhaPublished in: RFIDSec (2014)
Keyphrases
- authentication protocol
- rfid tags
- cellular networks
- key distribution
- mutual authentication
- wireless medium
- password authentication
- security analysis
- wireless local area network
- access points
- user authentication
- key agreement protocol
- cryptographic protocols
- authentication mechanism
- authentication scheme
- mobile nodes
- smart card
- lightweight
- covert channel
- wireless networks
- security requirements
- trusted third party
- rfid systems
- key exchange protocol
- wired networks
- secure communication
- security protocols
- wireless local area networks
- security model
- key agreement
- security mechanisms
- session key
- group communication
- mobile devices
- secure routing
- key management
- security services
- switched networks
- integrity verification
- data encryption
- provably secure
- identity management
- public key
- access control
- private key
- wireless technologies
- multi party
- mobile ad hoc networks
- wireless communication
- public key cryptography
- network infrastructure
- multi hop
- secure manner
- security issues
- security properties
- mobile terminals
- secret key
- ad hoc networks