Precision time protocol attack strategies and their resistance to existing security extensions.
Waleed AlghamdiMichael SchukatPublished in: Cybersecur. (2021)
Keyphrases
- key exchange protocol
- authentication protocol
- denial of service attacks
- secret key
- key agreement
- session key
- security protocols
- cryptographic protocols
- security properties
- security measures
- attack scenarios
- security vulnerabilities
- lightweight
- key agreement protocol
- diffie hellman
- cyber attacks
- key distribution
- rfid systems
- security analysis
- dos attacks
- mutual authentication
- public key
- rfid tags
- smart card
- security threats
- security requirements
- security services
- key exchange
- security issues
- adhoc network
- malicious users
- security model
- secure communication
- physical layer
- user authentication
- fault injection
- countermeasures
- security policies
- authentication mechanism
- communication protocols
- access control
- messages exchanged
- key management
- standard model
- security mechanisms
- encryption algorithm