A Comprehensive Review of Wireless Security Protocols and Encryption Applications.
Hasnain Nizam ThakurAbdullah Al HayajnehKutub ThakurAbu KamruzzamanMd Liakat AliPublished in: AIIoT (2023)
Keyphrases
- security protocols
- security properties
- key management
- cryptographic algorithms
- cryptographic protocols
- automated design
- secure communication
- wireless networks
- security services
- wireless communication
- ad hoc networks
- artificial immune algorithm
- mobile devices
- security mechanisms
- security requirements
- authentication protocol
- security analysis
- digital signature
- resource constrained
- rfid tags
- formal model
- computer systems
- wireless sensor networks