A promising security protocol for protecting near field communication devices from networking attacks.
Abu AsaduzzamanShanta MazumderSergio SalinasPublished in: Int. J. Secur. Networks (2018)
Keyphrases
- security protocols
- communication infrastructure
- network infrastructure
- security mechanisms
- cryptographic algorithms
- wireless sensor
- rfid tags
- key management
- communication networks
- security services
- resource constrained
- lightweight
- access control
- artificial immune algorithm
- authentication protocol
- distributed computing
- mobile devices
- embedded systems
- real time
- security requirements
- wireless sensor networks