000 03584nam a2200361 i 4500
003 CSPC
005 20231026133504.0
008 231019s2020 nju b 001 0 eng
010 _a 2019029942
020 _a9781119527923
_q(hardback)
040 _aDLC
_beng
_erda
_cDLC
_dCSPC
042 _apcc
050 0 0 _aTK5105.8857
_b.I735 2019
082 0 0 _223
_a005.83
_bIo8
245 0 0 _aIoT security :
_badvances in authentication /
_cedited by Madhusanka Liyanage [and 3 others].
250 _aFirst edition.
263 _a1911
264 1 _aHoboken, New Jersey :
_bWiley,
_c2020.
300 _axxix, 285 pages :
_billustrations ;
_c25 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aIntroduction to IoT -- Introduction to IoT security -- IoT network and communication authentication -- Symmetric key-based authentication with an application wireless sensor networks -- Public key based protocols- EC crypto -- Lattice-based cryptography and internet of things -- IoT user level authentication -- Efficient and anonymous mutual authentication protocol in multi-access edge computing (MEC) environments -- Biometric-based robust access control model for industrial internet of things applications -- Gadget free authentication -- WebMaDa 2.1 - a web based framework for handling user requests automatically and addressing data control in parallel -- IoT device level authentication -- PUF-based authentication and key exchange for internet of things -- Hardware- based encryption via generalized synchronization of complex networks -- IoT use cases and implementations -- IoT use cases and implementations: healthcare -- Secure and efficient privacy-preserving scheme in connected smart grid networks -- Blockchain-based cyber physical trust systems.
520 _a"The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"--
_cProvided by publisher.
650 0 _aInternet of things
_xSecurity measures.
700 1 _aLiyanage, Madhusanka,
_eeditor.
700 1 _aBraeken, An,
_d1970-
_eeditor.
700 1 _aKumar, Pardeep,
_d1976-
_eeditor.
700 1 _aYlianttila, Mika,
_eeditor.
942 _2ddc
_cBK
_h005.83
_iIo8
_kCIR
_m2020
_n0
999 _c26341
_d26341