Security implementation within GEN2 protocol | IEEE Conference Publication | IEEE Xplore