iTieProbe: Is Your IoT Setup Secure against (Modern) Evil Twin?
Anand AgrawalRajib Ranjan MaitiPublished in: CoRR (2023)
Keyphrases
- key management
- management system
- security mechanisms
- cloud computing
- security requirements
- security issues
- covert channel
- authentication mechanism
- case study
- highly efficient
- rfid systems
- mobile computing
- multi party
- lightweight
- website
- security analysis
- security protocols
- authentication protocol
- diffie hellman
- key exchange
- data encryption
- information systems
- real time