Show simple item record

AuthorChaudhry, Junaid
AuthorQidwai, Uvais A.
AuthorRittenhouse, Robert G.
AuthorLee, Malrey
Available date2024-05-07T05:39:59Z
Publication Date2012
Publication NameProceedings - 2012 International Conference on Emerging Technologies, ICET 2012
ResourceScopus
Identifierhttp://dx.doi.org/10.1109/ICET.2012.6375433
URIhttp://hdl.handle.net/10576/54694
AbstractIn network security goals such as confidentiality, authentication, integrity and non-repudiation can be achieved using cryptographic techniques. Cryptographic techniques are techniques to hide information from unauthorized persons. The fact is, even when strong cryptographic algorithms and protocols are applied, the security of communication systems cannot be guaranteed [1]. Since cryptographic protocols can contain several types of flaws and vulnerabilities that can be exploited by attackers, cryptographic verification for suitability is needed to detect all possible flaws and attacks against them. In Wireless Body Area Networks (WBANs) the cryptographic implementation comes at the expense of performance and power conservation making engineering of security protocols suitable for low powered networks a challenging task. This paper will discuss the possible flaws and attacks on cryptographic protocols, verification methods to detect these flaws and investigate the implementation of these protocols in the WBANs.
Languageen
PublisherIEEE
Subjectattacks on cryptographic protocols
Cryptographic protocol
cryptographic protocol flaws
cryptographic verification
WBAN security
TitleVulnerabilities and verification of cryptographic protocols and their future in Wireless Body Area Networks
TypeConference Paper
Pagination259-263


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record