Testing and Evaluating a Security-Aware Pub and Sub Protocol in a Fog-Driven IoT Environment.
Sabrina SicariAlessandra RizzardiLuigi Alfredo GriecoAlberto Coen-PorisiniPublished in: ADHOC-NOW (2020)
Keyphrases
- taking care
- rfid systems
- security protocols
- cryptographic protocols
- authentication protocol
- security problems
- management system
- key agreement protocol
- lightweight
- human operators
- key management
- single image
- security model
- denial of service attacks
- mobile robot
- security analysis
- network security
- key distribution
- electronic voting
- security properties
- information security
- mobile payment
- key exchange protocol
- weather conditions
- mobile agent system
- access control
- intrusion detection
- security requirements
- test cases