POSTER: iTieProbe: Is IoT Device Provisioning secure against MAC Layer authentication-token based replay attacks?
Anand AgrawalRajib Ranjan MaitiPublished in: AsiaCCS (2024)
Keyphrases
- security mechanisms
- cloud computing
- security issues
- mac layer
- quality of service
- cross layer
- security protocols
- network simulator
- resource constrained
- authentication protocol
- key management
- security requirements
- user authentication
- access control
- ad hoc networks
- mac protocol
- authentication scheme
- physical layer
- management system
- rfid tags
- smart card
- routing protocol
- resource management
- data center
- wireless networks
- data management
- channel assignment
- mobile agent system
- wireless ad hoc networks
- information security
- response time
- wireless link
- mobile ad hoc networks
- location information
- qos requirements
- multi layer
- mobile networks
- public key
- wireless sensor networks