A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study.
Chiara BraghinMario LilliElvinia RiccobenePublished in: Comput. Secur. (2023)
Keyphrases
- security protocols
- case study
- key management
- automated design
- security services
- security properties
- cryptographic algorithms
- management system
- artificial immune algorithm
- secure communication
- security mechanisms
- cryptographic protocols
- real world
- authentication protocol
- ad hoc networks
- software development
- resource constrained
- wireless sensor networks
- cloud computing
- secret key
- shortest path
- data warehouse
- real time