A security evaluation of popular Internet of Things protocols for manufacturers.
Daniel CelebuckiMaj Alan LinScott GrahamPublished in: ICCE (2018)
Keyphrases
- security protocols
- intrusion detection
- network security
- mobile devices
- access control
- authentication protocol
- key agreement protocol
- evaluation method
- key technologies
- security services
- security properties
- key management
- electronic voting
- cryptographic protocols
- key distribution
- security analysis
- security issues
- third party
- peer to peer