A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks.
Georgios KambourakisConstantinos KoliasDimitris GeneiatakisGeorgios KaropoulosGeorgios Michail MakrakisIoannis KounelisPublished in: Symmetry (2020)
Keyphrases
- rfid systems
- wireless local area network
- medium access control
- physical layer
- security protocols
- cryptographic protocols
- wireless networks
- key management
- ad hoc networking
- security problems
- authentication protocol
- wireless communication
- key agreement protocol
- key exchange protocol
- security analysis
- ad hoc networks
- key distribution
- adhoc network
- wired networks
- ubiquitous computing
- security properties
- wireless local area networks
- security model
- management system
- mobile nodes
- mutual authentication
- provably secure
- denial of service attacks
- mac protocol
- security issues
- lightweight
- routing protocol
- network layer
- protocol stack
- communication protocols
- multi hop
- access control
- security requirements
- mobile computing
- information security
- mobile agent system
- mobile networks
- wireless channels
- mobile payment
- elliptic curve
- diffie hellman
- mobile devices
- data dissemination
- messages exchanged
- wireless medium
- wireless sensor networks
- context aware
- intrusion detection
- smart card
- network security
- rfid tags
- wireless mesh networks
- cellular networks