Security Analysis of Device Binding for IP-based IoT Devices.
Jiongyi ChenMenghan SunKehuan ZhangPublished in: PerCom Workshops (2019)
Keyphrases
- security analysis
- security requirements
- public key
- management system
- smart card
- high security
- image encryption
- mobile devices
- encryption scheme
- authentication protocol
- security properties
- rfid tags
- mutual authentication
- user authentication
- embedded systems
- rfid systems
- cloud computing
- databases
- secret key
- intrusion detection