Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions.
Sen XuChin-Tser HuangPublished in: ISWCS (2006)
Keyphrases
- security protocols
- cryptographic protocols
- medium access control
- countermeasures
- watermarking scheme
- security flaws
- malicious attacks
- security properties
- security mechanisms
- intelligent agent technology
- wireless lan
- watermarking algorithm
- communication protocol
- ddos attacks
- communication protocols
- traffic analysis
- terrorist attacks
- anomaly detection