Countering Modeling Attacks in PUF-based IoT Security Solutions.
Wassila LalouaniMohamed F. YounisMohammad EbrahimabadiNaghmeh KarimiPublished in: ACM J. Emerg. Technol. Comput. Syst. (2022)
Keyphrases
- security problems
- security threats
- security issues
- security mechanisms
- security measures
- computer security
- buffer overflow
- information security
- security requirements
- security protocols
- security risks
- denial of service attacks
- cyber attacks
- data security
- key management
- java card
- management system
- identity theft
- malicious attacks
- security vulnerabilities
- stream cipher
- security breaches
- cloud computing
- security management
- rfid systems
- cryptographic protocols
- network security
- malicious users
- protection schemes
- secure routing
- security flaws
- electronic devices
- dos attacks
- ddos attacks
- countermeasures
- cryptographic algorithms
- big data
- intrusion detection