Security Challenges and Attacks in M2M Communications.
Amirhosein ImaniAlireza Keshavarz-HaddadMohsen EslamiJavad HaghighatPublished in: IST (2018)
Keyphrases
- security problems
- security threats
- security mechanisms
- security issues
- security concerns
- computer security
- java card
- security protocols
- chosen plaintext
- security vulnerabilities
- cyber attacks
- security risks
- security requirements
- computer networks
- information security
- security measures
- denial of service attacks
- fault injection
- security breaches
- countermeasures
- buffer overflow
- security flaws
- data security
- identity theft
- insider attacks
- intrusion detection
- security policies
- access control
- smart card
- cryptographic protocols
- cryptographic algorithms
- security and privacy issues
- stream cipher
- unauthorized access
- malicious users
- key management
- network security
- secure routing
- defense mechanisms
- malicious attacks
- network management
- sensitive data
- authentication scheme
- resource constrained
- advanced encryption standard
- communication networks
- privacy issues
- intrusion detection system