• English
    • العربية
  • العربية
  • Login
  • QU
  • QU Library
  •  Home
  • Communities & Collections
  • Help
    • Item Submission
    • Publisher policies
    • User guides
    • FAQs
  • About QSpace
    • Vision & Mission
View Item 
  •   Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  • Qatar University Digital Hub
  • Qatar University Institutional Repository
  • Academic
  • Faculty Contributions
  • College of Engineering
  • Computer Science & Engineering
  • View Item
  •      
  •  
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Vulnerabilities and verification of cryptographic protocols and their future in Wireless Body Area Networks

    Thumbnail
    Date
    2012
    Author
    Chaudhry, Junaid
    Qidwai, Uvais A.
    Rittenhouse, Robert G.
    Lee, Malrey
    Metadata
    Show full item record
    Abstract
    In network security goals such as confidentiality, authentication, integrity and non-repudiation can be achieved using cryptographic techniques. Cryptographic techniques are techniques to hide information from unauthorized persons. The fact is, even when strong cryptographic algorithms and protocols are applied, the security of communication systems cannot be guaranteed [1]. Since cryptographic protocols can contain several types of flaws and vulnerabilities that can be exploited by attackers, cryptographic verification for suitability is needed to detect all possible flaws and attacks against them. In Wireless Body Area Networks (WBANs) the cryptographic implementation comes at the expense of performance and power conservation making engineering of security protocols suitable for low powered networks a challenging task. This paper will discuss the possible flaws and attacks on cryptographic protocols, verification methods to detect these flaws and investigate the implementation of these protocols in the WBANs.
    DOI/handle
    http://dx.doi.org/10.1109/ICET.2012.6375433
    http://hdl.handle.net/10576/54694
    Collections
    • Computer Science & Engineering [‎2428‎ items ]

    entitlement


    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Home

    Submit your QU affiliated work

    Browse

    All of Digital Hub
      Communities & Collections Publication Date Author Title Subject Type Language Publisher
    This Collection
      Publication Date Author Title Subject Type Language Publisher

    My Account

    Login

    Statistics

    View Usage Statistics

    About QSpace

    Vision & Mission

    Help

    Item Submission Publisher policiesUser guides FAQs

    Qatar University Digital Hub is a digital collection operated and maintained by the Qatar University Library and supported by the ITS department

    Contact Us | Send Feedback
    Contact Us | Send Feedback | QU

     

     

    Video