New LQR Protocols with Intrusion Detection Schemes for IOT Security.
Jianming JiangZenon ChaczkoFiras Al-DoghmanWilson NarantakaPublished in: ICSEng (2017)
Keyphrases
- intrusion detection
- network security
- security problems
- key management
- security protocols
- intrusion detection system
- intrusion detection and prevention
- key agreement protocol
- cryptographic protocols
- key distribution
- communication protocols
- information security
- security services
- authentication protocol
- management system
- security properties
- security issues
- malicious users
- denial of service attacks
- anomaly detection
- cyber attacks
- computer networks
- security requirements
- application level
- key exchange
- access control
- data security
- security threats
- key establishment
- security mechanisms
- optimal control
- cloud computing
- communication protocol
- security analysis
- rfid systems
- statistical databases
- location information
- security measures
- big data
- network traffic
- secure multiparty computation
- sensor networks