Security Challenges of Selective Forwarding Attack and Design a Secure ECDH-Based Authentication Protocol to Improve RPL Security.
Haitham Y. AdarbahMostafa Farhadi MoghadamRolou Lyn Rodriguez MaataAmir Hossein MohajerzadehAli H. Al-BadiPublished in: IEEE Access (2023)
Keyphrases
- private key
- authentication protocol
- public key
- security analysis
- secret key
- key distribution
- smart card
- session key
- mutual authentication
- ciphertext
- diffie hellman
- digital signature
- authentication scheme
- encryption scheme
- security requirements
- signature scheme
- ban logic
- password authentication
- user authentication
- security properties
- secure communication
- key agreement
- rfid tags
- lightweight
- key management
- rfid systems
- hash functions
- security protocols
- security problems
- security mechanisms
- key exchange protocol
- information security
- cryptographic protocols
- software architecture
- encryption algorithm