A formal security analysis of ZigBee (1.0 and 3.0).
Li LiProyash PodderMd. Endadul HoquePublished in: HotSoS (2020)
Keyphrases
- security analysis
- security requirements
- high security
- public key
- smart card
- image encryption
- mutual authentication
- wireless communication
- wireless sensor networks
- security properties
- user authentication
- formal model
- encryption scheme
- wireless networks
- authentication scheme
- authentication protocol
- formal methods
- resource constrained
- database systems
- smart home
- query processing