A two-layer attack-robust protocol for IoT healthcare security.
Afsaneh SharafiSepideh AdabiAli MovagharSalah Al-MajeedPublished in: IET Commun. (2021)
Keyphrases
- key exchange protocol
- authentication protocol
- denial of service attacks
- rfid systems
- key agreement
- application layer
- cryptographic protocols
- security protocols
- attack scenarios
- management system
- security vulnerabilities
- key agreement protocol
- security problems
- provably secure
- key management
- physical layer
- smart card
- security model
- security properties
- cloud computing
- protocol stack
- security requirements
- cyber attacks
- communication protocols
- security analysis
- access control
- authentication scheme
- secure communication
- information systems
- lightweight
- security services
- mobile payment
- trusted third party
- security threats
- security mechanisms
- secret key
- authentication mechanism
- intrusion detection
- protocol specification
- virtual private network