Home Page Icon
Home Page
Table of Contents for
Part IV: IoT Device Level Authentication
Close
Part IV: IoT Device Level Authentication
by Madhusanka Liyanage, An Braeken, Pardeep Kumar,
IoT Security
Cover
About the Editors
List of Contributors
Preface
IoT
The Need for Security
The Need for Authentication
Intended Audience
Book Organization
Acknowledgments
Part I: IoT Overview
1 Introduction to IoT
1.1 Introduction
1.2 IoT Architecture and Taxonomy
1.3 Standardization Efforts
1.4 IoT Applications
Acknowledgement
References
2 Introduction to IoT Security
2.1 Introduction
2.2 Attacks and Countermeasures
2.3 Authentication and Authorization
2.4 Other Security Features and Related Issues
2.5 Discussion
2.6 Future Research Directions
2.7 Conclusions
References
Part II: IoT Network and Communication Authentication
3 Symmetric Key‐Based Authentication with an Application to Wireless Sensor Networks
3.1 Introduction
3.2 Related Work
3.3 System Model and Assumptions
3.4 Scheme in Normal Mode
3.5 Authentication
3.6 Scheme in Change Mode
3.7 Security Analysis
3.8 Efficiency
3.9 Conclusions
Acknowledgement
References
4 Public Key Based Protocols – EC Crypto
4.1 Introduction to ECC
4.2 ECC Based Implicit Certificates
4.3 ECC‐Based Signcryption
4.4 ECC‐Based Group Communication
4.5 Implementation Aspects
4.6 Discussion
References
5 Lattice‐Based Cryptography and Internet of Things
5.1 Introduction
5.2 Lattice‐Based Cryptography
5.3 Lattice‐Based Primitives
5.4 Lattice‐Based Cryptography for IoT
5.5 Conclusion
References
Part III: IoT User Level Authentication
6 Efficient and Anonymous Mutual Authentication Protocol in Multi‐Access Edge Computing (MEC) Environments
6.1 Introduction
6.2 Related Work
6.3 Network Model and Adversary Model
6.4 Proposed Scheme
6.5 Security and Performance Evaluation
6.6 Conclusion
References
7 Biometric‐Based Robust Access Control Model for Industrial Internet of Things Applications
7.1 Introduction
7.2 Related Work
7.3 Network Model, Threat Model and Security Requirements
7.4 Proposed Access Control Model in IIoT
7.5 Security and Performance Evaluations
7.6 Conclusions
References
8 Gadget Free Authentication
8.1 Introduction to Gadget‐Free World
8.2 Introduction to Biometrics
8.3 Gadget‐Free Authentication
8.4 Preliminary Aspects
8.5 The System
8.6 Security Analysis
8.7 Performance Analysis
8.8 Conclusions
Acknowledgement
References
9 WebMaDa 2.1 – A Web‐Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel
9.1 Introduction
9.2 IoT‐Related Concerns
9.3 Design Decisions
9.4 WebMaDa's History
9.5 WebMaDa 2.1
9.6 Implementation
9.7 Proof of Operability
9.8 Summary and Conclusions
References
Notes
Part IV: IoT Device Level Authentication
10 PUF‐Based Authentication and Key Exchange for Internet of Things
10.1 Introduction
10.2 Related Work
10.3 Preliminaries
10.4 Proposed System
10.5 Security Evaluation
10.6 Performance
10.7 Conclusions
References
11 Hardware‐Based Encryption via Generalized Synchronization of Complex Networks
11.1 Introduction
11.2 System Scheme: Synchronization without Correlation
11.3 The Chaotic Followers
11.4 The Complete System
11.5 Conclusions and Outlook
Acknowledgements
Author Contributions Statement
Additional Information
References
Part V: IoT Use Cases and Implementations
12 IoT Use Cases and Implementations: Healthcare
12.1 Introduction
12.2 Remote Patient Monitoring Architecture
12.3 Security Related to eHealth
12.4 Remote Patient Monitoring Security
12.5 Conclusion
References
13 Secure and Efficient Privacy‐preserving Scheme in Connected Smart Grid Networks
13.1 Introduction
13.2 Preliminaries
13.3 Proposed Scheme
13.4 Security Analysis
13.5 Performance Analysis
13.6 Conclusions
References
14 Blockchain‐Based Cyber Physical Trust Systems
14.1 Introduction
14.2 Related Work
14.3 Overview of Use‐Cases and Security Goals
14.4 Proposed Approach
14.5 Evaluation Results
14.6 Conclusion
References
Notes
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
9 WebMaDa 2.1 – A Web‐Based Framework for Handling User Requests Automatically and Addressing Data Control in Parallel
Next
Next Chapter
10 PUF‐Based Authentication and Key Exchange for Internet of Things
Part IV
IoT Device Level Authentication
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset