Vulnerabilities and verification of cryptographic protocols and their future in Wireless Body Area Networks
Abstract
In network security goals such as confidentiality, authentication, integrity and non-repudiation can be achieved using cryptographic techniques. Cryptographic techniques are techniques to hide information from unauthorized persons. The fact is, even when strong cryptographic algorithms and protocols are applied, the security of communication systems cannot be guaranteed [1]. Since cryptographic protocols can contain several types of flaws and vulnerabilities that can be exploited by attackers, cryptographic verification for suitability is needed to detect all possible flaws and attacks against them. In Wireless Body Area Networks (WBANs) the cryptographic implementation comes at the expense of performance and power conservation making engineering of security protocols suitable for low powered networks a challenging task. This paper will discuss the possible flaws and attacks on cryptographic protocols, verification methods to detect these flaws and investigate the implementation of these protocols in the WBANs.
Collections
- Computer Science & Engineering [2491 items ]
Related items
Showing items related by title, author, creator and subject.
-
Security of cooperative intelligent transport systems: Standards, threats analysis and cryptographic countermeasures
Ben Hamida, Elyes; Noura, Hassan; Znaidi, Wassim ( MDPI , 2015 , Article)Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology ... -
Cryptographic ransomware encryption detection: Survey
Kenan, Begovic; Al-Ali, Abdulaziz; Malluhi, Qutaibah ( Elsevier , 2023 , Article)The ransomware threat has loomed over our digital life since 1989. Criminals use this type of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts in ransom. The damage ransomware ...



