How to Authenticate MQTT Sessions Without Channel- and Broker Security.
Reto E. KoenigPublished in: CoRR (2019)
Keyphrases
- physical layer
- information security
- security issues
- multi channel
- security systems
- intrusion detection
- lightweight
- network security
- information assurance
- security level
- computer security
- security policies
- statistical databases
- access control
- web services
- security management
- multiple access
- security problems
- security requirements
- security mechanisms
- communication channels
- computer simulation
- security model
- data security
- user authentication
- security analysis
- anomaly detection
- e government