Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications.
Reiner DojenVladimir PascaTom CoffeyPublished in: MobiSec (2009)
Keyphrases
- end to end
- security protocols
- authentication protocol
- security mechanisms
- ad hoc networks
- cryptographic algorithms
- key management
- congestion control
- wireless link
- smart card
- security services
- mobile networks
- multipath
- rfid tags
- security requirements
- security analysis
- mobile devices
- communication systems
- application layer
- service delivery
- resource constrained
- mobile ad hoc networks
- network management
- anomaly detection
- access control
- real time
- text localization and recognition