000 | 03584nam a2200361 i 4500 | ||
---|---|---|---|
003 | CSPC | ||
005 | 20231026133504.0 | ||
008 | 231019s2020 nju b 001 0 eng | ||
010 | _a 2019029942 | ||
020 |
_a9781119527923 _q(hardback) |
||
040 |
_aDLC _beng _erda _cDLC _dCSPC |
||
042 | _apcc | ||
050 | 0 | 0 |
_aTK5105.8857 _b.I735 2019 |
082 | 0 | 0 |
_223 _a005.83 _bIo8 |
245 | 0 | 0 |
_aIoT security : _badvances in authentication / _cedited by Madhusanka Liyanage [and 3 others]. |
250 | _aFirst edition. | ||
263 | _a1911 | ||
264 | 1 |
_aHoboken, New Jersey : _bWiley, _c2020. |
|
300 |
_axxix, 285 pages : _billustrations ; _c25 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aIntroduction to IoT -- Introduction to IoT security -- IoT network and communication authentication -- Symmetric key-based authentication with an application wireless sensor networks -- Public key based protocols- EC crypto -- Lattice-based cryptography and internet of things -- IoT user level authentication -- Efficient and anonymous mutual authentication protocol in multi-access edge computing (MEC) environments -- Biometric-based robust access control model for industrial internet of things applications -- Gadget free authentication -- WebMaDa 2.1 - a web based framework for handling user requests automatically and addressing data control in parallel -- IoT device level authentication -- PUF-based authentication and key exchange for internet of things -- Hardware- based encryption via generalized synchronization of complex networks -- IoT use cases and implementations -- IoT use cases and implementations: healthcare -- Secure and efficient privacy-preserving scheme in connected smart grid networks -- Blockchain-based cyber physical trust systems. | |
520 |
_a"The Internet of things (IoT) is the network of physical devices such as vehicles, home appliances sensors, actuators and other electronic devices. The development of internet offers the possibility for these objects to connect and exchange data. Since IoT will pay a major role in our lives, it is important to secure the IoT ecosystem for its value to be realized. Among the various security requirements, authentication to the IoT is importance since it is the first step to prevent the impact of attackers. The book offers an insight into the development of various authentication mechanisms to provide IoT authentication in various levels such as user level, device level and network level. The user-level authentication identifies whether the IoT user is a legitimate user to access the smart object services and what kind of authentication mechanisms can be used. Network level authentication is needed to check the identity of connected IoT devices. This book, therefore, offers reference material which will be important for all relative stakeholders of mobile networks such as network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations and security solution developers"-- _cProvided by publisher. |
||
650 | 0 |
_aInternet of things _xSecurity measures. |
|
700 | 1 |
_aLiyanage, Madhusanka, _eeditor. |
|
700 | 1 |
_aBraeken, An, _d1970- _eeditor. |
|
700 | 1 |
_aKumar, Pardeep, _d1976- _eeditor. |
|
700 | 1 |
_aYlianttila, Mika, _eeditor. |
|
942 |
_2ddc _cBK _h005.83 _iIo8 _kCIR _m2020 _n0 |
||
999 |
_c26341 _d26341 |