A Review of PROFIBUS Protocol Vulnerabilities - Considerations for Implementing Authentication and Authorization Controls.
Venesa WatsonXinxin LouYuan GaoPublished in: SECRYPT (2017)
Keyphrases
- security mechanisms
- access control
- trust negotiation
- security requirements
- authentication protocol
- security protocols
- security analysis
- information security
- security model
- key distribution
- security properties
- security services
- mutual authentication
- trusted third party
- security vulnerabilities
- smart card
- fine grained
- ban logic
- password authentication
- lightweight
- access control policies
- security issues
- key agreement
- user authentication
- authentication scheme
- biometric authentication
- formal analysis
- security policies
- countermeasures
- key agreement protocol
- rfid tags
- digital signature
- authentication mechanism
- data security
- resource constrained
- conflict resolution
- wireless local area network
- key exchange protocol
- public key cryptography
- trust management
- access rights
- diffie hellman