IoT Security Mechanisms in the Example of BLE.
Evgeny KalininDanila BelyakovDmitry BraginAnton KonevPublished in: Comput. (2021)
Keyphrases
- security mechanisms
- security problems
- resource constrained
- security issues
- access control
- smart card
- security requirements
- security systems
- cloud computing
- operating system
- management system
- key management
- security services
- cryptographic algorithms
- security protocols
- big data
- digital signature
- rfid systems
- payment systems
- information security
- resource constraints
- database systems
- databases
- database