Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

IoT Security: Advances in Authentication - Research Book

IoT Security: Advances in Authentication

Leading Research Book for IoT Security: Advances in Authentication

Author(s) Name:  Madhusanka Liyanage; An Braeken; Pardeep Kumar; Mika Ylianttila

About the Book:

   The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level.
   The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors—noted experts on the topic—provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases.

Table of Contents

  • Introduction to IoT
  • Introduction to IoT Security
  • Symmetric Key-Based Authentication with an Application to Wireless Sensor Networks
  • Public Key Based Protocols – EC Crypto
  • Lattice-Based Cryptography and Internet of Things
  • Efficient and Anonymous Mutual Authentication Protocol in Multi-Access Edge Computing (MEC) Environments
  • Biometric-Based Robust Access Control Model for Industrial Internet of Things Applications
  • Gadget Free Authentication
  • WebMaDa 2.1 – A Web-Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel
  • PUF-Based Authentication and Key Exchange for Internet of Things
  • Hardware-Based Encryption via Generalized Synchronization of Complex Networks
  • IoT Use Cases and Implementations: Healthcare
  • Secure and Efficient Privacy-preserving Scheme in Connected Smart Grid Networks
  • Blockchain-Based Cyber Physical Trust Systems
  • ISBN:  978-1-119-52792-3

    Publisher:  Wiley Telecom

    Year of Publication:  2020

    Book Link:  Home Page Url