Internet of Things Protocols Comparison, Architecture, Vulnerabilities and Security: State of the art.
Yassine ChahidMohammed BenabdellahAbdelmalek AziziPublished in: ICCWCS (2017)
Keyphrases
- information security
- communication protocols
- security vulnerabilities
- security issues
- security protocols
- security flaws
- security mechanisms
- key technologies
- application level
- security properties
- security architecture
- security services
- security breaches
- mobile devices
- key agreement protocol
- intrusion detection
- security risks
- communication protocol
- network security
- digital rights management
- cryptographic protocols
- management system
- formal model
- messages exchanged
- security threats
- information systems
- authentication protocol
- access control
- security requirements
- future internet
- key exchange
- physical world
- security patterns
- software architecture
- security policies
- web services