Cryptographic Security Solutions for the Internet of Things 1st edition by Mohammad Tariq Banday – Ebook PDF Instant Download/Delivery: 1522586296, 978-1522586296
Full download Cryptographic Security Solutions for the Internet of Things 1st edition after payment

Product details:
ISBN 10: 1522586296
ISBN 13: 978-1522586296
Author: Mohammad Tariq Banday
The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks. Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.
Cryptographic Security Solutions for the Internet of Things 1st Table of contents:
Section 1: Introduction
Chapter 1: Security in Context of the Internet of Things
ABSTRACT
INTRODUCTION
TECHNOLOGIES ENABLING INTERNET OF THINGS
THREATS AND SECURITY
CRYPTOGRAPHY AND ITS APPLICATIONS IN THE INTERNET OF THINGS
CONCLUSION
REFERENCES
Section 2: Encryption and Cryptography
Chapter 2: Encryption Principles and Techniques for the Internet of Things
ABSTRACT
INTRODUCTION
BACKGROUND
LIGHTWEIGHT CRYPTOGRAPHY
BASIC OPERATIONS
ENCRYPTION TECHNIQUES FOR IOT
COMPARISON OF LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHMS FOR IOT
CONCLUSION AND FUTURE DIRECTIONS
REFERENCES
KEY TERMS AND DEFINITIONS
Chapter 3: A Review of Cryptographic Algorithms for the Internet of Things
ABSTRACT
INTRODUCTION
BACKGROUND
IOT ARCHITECTURE
CRYPTOGRAPHIC ALGORITHMS FOR IOT
LIGHTWEIGHT CRYPTOGRAPHY ALGORITHMS
COMPARISON OF LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHMS
CONCLUSION AND FUTURE WORK
REFERENCES
Section 3: Security Protocols
Chapter 4: Addressing Security Issues of the Internet of Things Using Physically Unclonable Functions
ABSTRACT
INTRODUCTION
PUF ATTRIBUTES AND METRICS
PUF CIRCUIT DESIGNS
GENERATION OF PUF RESPONSES
VULNERABILITY ANALYSIS IN PUFs: CHALLENGES AND OPPORTUNITIES
PUF-ENHANCED CRYPTOGRAPHY
CONCLUSION
REFERENCES
Chapter 5: Hardware Primitives-Based Security Protocols for the Internet of Things
ABSTRACT
INTRODUCTION
INTRODUCTION TO PUFs
PUF BASED SECURITY PROTOCOLS FOR THE IOT
SECURITY ANALYSIS AND DISCUSSION
CONCLUSION
REFERENCES
Chapter 6: Secure Computation of Private Set Intersection Cardinality With Linear Complexity
ABSTRACT
INTRODUCTION
BACKGROUND
RELATED WORKS
ONE-WAY PSI-CA AND APSI-CA PROTOCOLS
MPSI-CA PROTOCOL
CONCLUSION
REFERENCES
Chapter 7: A Secure Gateway Discovery Protocol Using Elliptic Curve Cryptography for Internet-Integrated MANET
ABSTRACT
INTRODUCTION
ARITHMETIC BACKGROUND OF ECC
LITERATURE REVIEW
MOTIVATION FOR RESEARCH
PROPOSED SECURITY PROTOCOL
SECURITY ANALYSIS OF PROPOSED PROTOCOL
PERFORMANCE EVALUATION BASED ON COMPUTATIONAL TIME
CONCLUSION AND FUTURE SCOPE
REFERENCES
Chapter 8: Preserving Security of Mobile Anchors Against Physical Layer Attacks
ABSTRACT
INTRODUCTION
RELATED WORKS
SECURITY ISSUES IN WIRELESS SENSOR NETWORKS
PROPOSED SECURITY MODEL PERSPECTIVES
PERFORMANCE EVALUATION FRAMEWORK
CONCLUSION
REFERENCES
Chapter 9: An Adaptive Security Framework for the Internet of Things Applications Based on the Contextual Information
ABSTRACT
INTRODUCTION
BACKGROUND
ADAPTIVE SECURITY FRAMEWORK USING CONTEXT
EXPERIMENTAL EVALUATION
CONCLUSION
REFERENCES
Section 4: Social/Legal Issues and Forensics
Chapter 10: Emerging Social and Legal Issues of the Internet of Things
ABSTRACT
THE ‘INTERNET OF THINGS’ MODEL
IoT FRAMEWORK WITHIN REGULATION (EU) 2016/679
COMPARISON OF THE ANONYMIZATION PROCESS OF USA: EUROPE
TOWARDS PII 2.0
THE ’NOTICE AND CONSENT’ MODEL IN SAFEGUARDING THE CONSUMER
POSSIBLE DEVELOPMENTS: TOWARDS AN OPT-OUT SCHEME
CONCLUSION
REFERENCES
KEY TERMS AND DEFINITIONS
Chapter 11: Digital Forensics in the Context of the Internet of Things
ABSTRACT
INTRODUCTION
LITERATURE SURVEY AND RELATED WORK
DIGITAL FORENSICS AND IOT
IOT FORENSICS
ROLE OF IOT IN DIGITAL FORENSICS
VARIATION OF IOT FORENSICS FROM TRADITIONAL DIGITAL FORENSICS
IOT FORENSICS AT DIFFERENT LAYERS
DIGITAL EVIDENCE IN IOT FORENSICS
REQUIREMENTS OF FUTURE GENERATIONS OF IOT SYSTEMS
CONCLUSION
ACKNOWLEDGMENT
REFERENCES
Compilation of References
About the Contributors
People also search for Cryptographic Security Solutions for the Internet of Things 1st :
internet security
cryptographic technologies
cryptographic-based security systems
cryptographic security and methods
a cryptographic key is necessary to read encoded material
Tags: Mohammad Tariq Banday, Cryptographic Security, the Internet


