Security Access Protocols in IoT Networks with Heterogenous Non-IP Terminals.
Romeo GiulianoFranco MazzengaAlessandro NeriAnna Maria VegniPublished in: DCOSS (2014)
Keyphrases
- access control
- security protocols
- key management
- communication protocols
- key distribution
- security problems
- cryptographic protocols
- ns simulator
- transaction processing systems
- social networks
- access requests
- internet protocol
- network layer
- authentication protocol
- security properties
- security mechanisms
- key agreement protocol
- key exchange
- information security
- security services
- intrusion detection
- network management
- computer networks
- access points
- ip networks
- role based access control
- ip addresses
- security policies
- packet forwarding
- data sources
- key establishment
- label switching
- heterogeneous networks
- security issues
- communication networks
- location information
- diffie hellman
- network resources