Normal view MARC view ISBD view

Internet of Things Security : Challenges, Advances, and Analytics / by Chintan Patel and Nishant Doshi.

By: Patel, Chintan [author.].
Contributor(s): Doshi, Nishant [author.] | Taylor and Francis.
Material type: materialTypeLabelBookPublisher: Boca Raton, FL : Auerbach Publications, [2018]Copyright date: ©2019Edition: First edition.Description: 1 online resource (260 pages) : 227 illustrations, text file, PDF.Content type: text Media type: computer Carrier type: online resourceISBN: 9780429454448.Subject(s): Internet of things -- Security measures | COMPUTERS / Security / General | TECHNOLOGY & ENGINEERING / Mobile & Wireless CommunicationsGenre/Form: Electronic books.Additional physical formats: Print version: : No titleOnline resources: Click here to view. Also available in print format.
Contents:
1. Internet of Things: An Overview. -- 2. A Mathematical Foundation. -- 3. IoT Authentication. -- 4. Single-Server Authentication. -- 5. Multi-Server Authentication Schemes. -- 6. Attacks and Remedies. -- 7. Analytical Matrices and Tools. -- 8. Future Work and Conclusion.
Abstract: Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.
    average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references and index.

1. Internet of Things: An Overview. -- 2. A Mathematical Foundation. -- 3. IoT Authentication. -- 4. Single-Server Authentication. -- 5. Multi-Server Authentication Schemes. -- 6. Attacks and Remedies. -- 7. Analytical Matrices and Tools. -- 8. Future Work and Conclusion.

Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.

Also available in print format.

There are no comments for this item.

Log in to your account to post a comment.