Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack.
Shan-Shan TuMuhammad WaqasSadaqat ur RehmanMuhammad AamirObaid Ur RehmanJianbiao ZhangChinchen ChangPublished in: IEEE Access (2018)
Keyphrases
- authentication protocol
- security analysis
- smart card
- information security
- security measures
- cyber attacks
- security protocols
- encryption algorithm
- security requirements
- access control
- public key
- countermeasures
- key exchange protocol
- user authentication
- authentication scheme
- security vulnerabilities
- lightweight
- secret key
- network security
- single image
- security policies
- fault injection
- java card
- authentication mechanism
- malicious users
- dos attacks
- security mechanisms
- security properties
- denial of service attacks
- forensic analysis
- defense mechanisms
- buffer overflow
- attack scenarios
- security management
- security problems
- statistical databases
- cyber security