Amazon cover image
Image from Amazon.com
Image from Coce

IoT security : advances in authentication / edited by Madhusanka Liyanage [and 3 others].

Contributor(s): Material type: TextTextPublisher: Hoboken, New Jersey : Wiley, 2020Edition: First editionDescription: xxix, 285 pages : illustrations ; 25 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781119527923
Subject(s): DDC classification:
  • 23 005.83 Io8
LOC classification:
  • TK5105.8857 .I735 2019
Contents:
Introduction to IoT -- Introduction to IoT security -- IoT network and communication authentication -- Symmetric key-based authentication with an application wireless sensor networks -- Public key based protocols- EC crypto -- Lattice-based cryptography and internet of things -- IoT user level authentication -- Efficient and anonymous mutual authentication protocol in multi-access edge computing (MEC) environments -- Biometric-based robust access control model for industrial internet of things applications -- Gadget free authentication -- WebMaDa 2.1 - a web based framework for handling user requests automatically and addressing data control in parallel -- IoT device level authentication -- PUF-based authentication and key exchange for internet of things -- Hardware- based encryption via generalized synchronization of complex networks -- IoT use cases and implementations -- IoT use cases and implementations: healthcare -- Secure and efficient privacy-preserving scheme in connected smart grid networks -- Blockchain-based cyber physical trust systems.
Summary: "The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books Main Library-Nabua Circulation Section CIR 005.83 Io8 2020 (Browse shelf(Opens below)) 1-1 Available 026156

Includes bibliographical references and index.

Introduction to IoT -- Introduction to IoT security -- IoT network and communication authentication -- Symmetric key-based authentication with an application wireless sensor networks -- Public key based protocols- EC crypto -- Lattice-based cryptography and internet of things -- IoT user level authentication -- Efficient and anonymous mutual authentication protocol in multi-access edge computing (MEC) environments -- Biometric-based robust access control model for industrial internet of things applications -- Gadget free authentication -- WebMaDa 2.1 - a web based framework for handling user requests automatically and addressing data control in parallel -- IoT device level authentication -- PUF-based authentication and key exchange for internet of things -- Hardware- based encryption via generalized synchronization of complex networks -- IoT use cases and implementations -- IoT use cases and implementations: healthcare -- Secure and efficient privacy-preserving scheme in connected smart grid networks -- Blockchain-based cyber physical trust systems.

"The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"-- Provided by publisher.

There are no comments on this title.

to post a comment.