A Security Enhancement of the Precision Time Protocol Using a Trusted Supervisor Node.
Waleed AlghamdiMichael SchukatPublished in: Sensors (2022)
Keyphrases
- network connection
- cryptographic protocols
- security protocols
- trusted computing
- key agreement protocol
- authentication protocol
- security analysis
- security model
- key exchange protocol
- security properties
- communication protocols
- key management
- provably secure
- rfid systems
- security requirements
- secure routing
- key agreement
- denial of service attacks
- residual energy
- mutual authentication
- access control
- key distribution
- lightweight
- key management scheme
- security issues
- security policies
- trust relationships
- fair exchange protocols
- trust negotiation
- messages exchanged
- protocol specification
- virtual private network
- physical layer
- information security
- multi party
- ad hoc networking
- intrusion detection
- trusted platform module
- network security
- mobile payment
- computer security
- elliptic curve
- node selection
- diffie hellman
- blind signature scheme
- fair exchange
- formal analysis
- key establishment
- application layer
- homomorphic encryption
- ad hoc networks
- energy consumption
- network layer