A SKG Security Challenge: Indoor SKG Under an On-The-Shoulder Eavesdropping Attack.
Amitha MayyaMiroslav MitevArsenia ChortiGerhard P. FettweisPublished in: GLOBECOM (2023)
Keyphrases
- security measures
- cyber attacks
- security vulnerabilities
- key exchange protocol
- information security
- countermeasures
- intrusion detection
- fault injection
- security policies
- security risks
- access control
- authentication mechanism
- malicious attacks
- forensic analysis
- denial of service attacks
- dos attacks
- key agreement
- attack scenarios
- encryption algorithm
- security mechanisms
- malicious users
- security management
- security issues
- computer security
- defense mechanisms
- intrusion detection system
- denial of service
- network security
- security problems
- statistical databases
- trust relationships
- block cipher
- cyber security
- malicious activities
- java card
- sensitive data
- security requirements
- privacy preserving
- anomaly detection