ProFactory: Improving IoT Security via Formalized Protocol Customization.
Fei WangJianliang WuYuhong NanYousra AaferXiangyu ZhangDongyan XuMathias PayerPublished in: USENIX Security Symposium (2022)
Keyphrases
- rfid systems
- cryptographic protocols
- security problems
- key agreement protocol
- key management
- security protocols
- authentication protocol
- key distribution
- security properties
- security analysis
- key exchange protocol
- provably secure
- communication protocols
- security requirements
- secure multiparty computation
- ban logic
- formal analysis
- statistical databases
- mutual authentication
- security model
- denial of service attacks
- management system
- mobile agent system
- diffie hellman
- electronic voting
- physical layer
- security issues
- cryptographic algorithms
- elliptic curve
- secure routing
- security services
- intrusion detection
- key exchange
- information security
- contractual obligations
- key establishment
- lightweight
- smart card
- mobile payment
- network security
- security policies
- privacy protection
- trust negotiation
- medium access control
- network layer
- key agreement
- data security
- access control
- standard model
- user interface
- communication protocol