Securing Wireless Coprocessors from Attacks in the Internet of Things.
Jason StaggsSujeet ShenoiPublished in: Critical Infrastructure Protection (2019)
Keyphrases
- mobile devices
- countermeasures
- information security
- smart card
- wireless networks
- wireless communication
- key technologies
- wifi
- mobile computing
- ubiquitous computing
- mobile users
- mobile networks
- communication technologies
- malicious attacks
- watermarking scheme
- location information
- physical world
- traffic analysis
- ddos attacks
- security protocols
- chosen plaintext
- malicious users
- watermarking technique
- cellular networks
- location based services
- digital images
- cognitive radio
- identity management
- denial of service attacks
- end to end