PUF-Based Protocol for Securing Constrained Devices.
Arthur DesuertStéphanie CholletLaurent PionDavid HélyPublished in: Intelligent Environments (2021)
Keyphrases
- electronic devices
- lightweight
- smart phones
- mobile devices
- coloured petri nets
- mobile applications
- tcp ip
- embedded devices
- network devices
- network protocols
- wired networks
- embedded systems
- information security
- authentication protocol
- communication protocol
- application layer
- energy consumption
- internet protocol
- network simulator
- real time