A New Access Protocol for Elevating the Security of IJTAG Network.
Gaurav KumarAnjum RiazYamuna PrasadSatyadev AhlawatPublished in: ATS (2022)
Keyphrases
- virtual private network
- access control
- communication protocol
- packet filtering
- network layer
- protocol stack
- denial of service attacks
- ns simulator
- network protocols
- security protocols
- network simulator
- network management
- security threats
- network access
- communication protocols
- authentication protocol
- remote server
- network security
- protocol specification
- computer networks
- cryptographic protocols
- access requests
- application layer
- lightweight
- security requirements
- smart card
- security policies
- provably secure
- peer to peer
- intrusion detection
- wireless networks
- key exchange protocol
- network traffic
- information security
- security measures
- ip address
- security mechanisms
- security properties
- network monitoring
- security model
- network devices
- ad hoc networks
- medium access control
- security analysis
- network structure
- routing protocol
- access points
- wireless sensor networks