Security Improvements by Separating the Cryptographic Protocol from the Network Stack onto a Multi-MCU Architecture.
Tobias FrauenschlägerSebastian RennerJürgen MottokPublished in: ARCS (2020)
Keyphrases
- cryptographic protocols
- network architecture
- network services
- intrusion detection and prevention
- security threats
- authentication protocol
- security protocols
- network access
- application level
- network management
- security architecture
- security properties
- network traffic
- information security
- wireless sensor networks
- network security
- real time
- low cost
- security issues
- key management
- rfid tags
- computer networks
- wireless networks
- data integration
- lightweight
- access control
- sensor networks
- encryption decryption
- insider attacks