Reference Hub4
Cryptographic Security Solutions for the Internet of Things

Cryptographic Security Solutions for the Internet of Things

Copyright: © 2019 |Pages: 367
ISBN13: 9781522557425|ISBN10: 1522557423|EISBN13: 9781522557432|ISBN13 Softcover: 9781522586296
DOI: 10.4018/978-1-5225-5742-5
Cite Book Cite Book

MLA

Banday, Mohammad Tariq, editor. Cryptographic Security Solutions for the Internet of Things. IGI Global, 2019. https://doi.org/10.4018/978-1-5225-5742-5

APA

Banday, M. T. (Ed.). (2019). Cryptographic Security Solutions for the Internet of Things. IGI Global. https://doi.org/10.4018/978-1-5225-5742-5

Chicago

Banday, Mohammad Tariq, ed. Cryptographic Security Solutions for the Internet of Things. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-5742-5

Export Reference

Mendeley
Favorite Full-Book Download

The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks.

Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Introduction  (pages 25-25)
This section provides an overview of the Internet of Things including its applications, underlying technologies, and security challenges and reviews the literature and potential applications of cryptography to secure the internet of...
Introduction
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
This section presents encryption principles and discusses various cryptographic algorithms including lightweight cryptography that are applicable for the security of the Internet of Things.
Encryption and Cryptography
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Security Protocols  (pages 94-94)
This section discusses some schemes and protocols for securing Internet of Things. These include physically unclonable functions that promise cryptographic security enablers for resource-constrained IoT devices and hardware...
Security Protocols
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
This section illustrates various concerns regarding the social and legal aspects of the internet of things through a case study. It also discusses the importance of digital forensics for the Internet of Things and its underlying...
Social/Legal Issues and Forensics
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.