Integrated system for control and monitoring industrial wireless networks for labor risk prevention
Journal of Network and Computer Applications
Hi-index | 0.00 |
Conventional access control mechanisms, relying on a single security token to authenticate remote users, introduce a single point of failure and are vulnerable to relay attacks. A threshold-based distance-bounding protocol that distributes a user's private key among various personal devices improves system security and reliability.