Internet of Things Security: Challenges, Advances, and Analytics
Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.

1128944439
Internet of Things Security: Challenges, Advances, and Analytics
Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.

210.0 In Stock
Internet of Things Security: Challenges, Advances, and Analytics

Internet of Things Security: Challenges, Advances, and Analytics

Internet of Things Security: Challenges, Advances, and Analytics

Internet of Things Security: Challenges, Advances, and Analytics

Hardcover

$210.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.


Product Details

ISBN-13: 9781138341364
Publisher: Taylor & Francis
Publication date: 08/21/2018
Pages: 260
Product dimensions: 6.12(w) x 9.19(h) x (d)

About the Author

Chintan Patel is a research scholar in the Department of Computer Engineering at Pandit Deendayal Petroleum University, Gandhinagar Gujarat. Mr. Patel has more than four years of experience in academics. He has completed masters from SRM University, Chennai, India and is pursuing a Ph.D. from PDPU, Gandhinagar India. With the effective academic, he is an active researcher and have published papers in various reputed journals like springer.His main area of interest includes Cryptography,Wireless Sensor Network and Internet of Things. He has also worked as a Microsoft student partner for SRM University. He is an active member of IEEE,Computer society of India and Many other international organizations. Mr. Patel has authored various books with TATA MacGraw-Hill and Amazon. Currently he is working on Internet of Things and Cryptography.

Nishant Doshi is an academician and researcher with more than 6 years experience.Currently he is a faculty member in the Department of Computer Engineering at PDPU, Gandhinagar, India since 2016. His main research interests includes algorithms,cryptography and remote user authentication, information protection in general. He has completed masters from DA-IICT, Gandhinagar in 2009 and doctorate from National Institute of Technology, Surat in 2014. Along with active researcher and editorial members of various reputed journals like Springer, Dr. Doshi is reviewer of various reputed journals like springers and IEEE Transactions. he is Editor-in-Chief of journals like IJCES, IJECEE,IJME, IJMES, and IJSCE. He has also authored books on cryptography and programming with various reputed publications like CRC and Amazon. He was rewarded as Young Scientist Award of india from Venus International Foundation for 2015 and 2017. Dr. Doshi is member of IEEE, ACM, and many more international and national scientifc bodies.

Table of Contents

1. Internet of Things: An Overview.

2. A Mathematical Foundation.

3. IoT Authentication.

4. Single-Server Authentication.

5. Multi-Server Authentication Schemes.

6. Attacks and Remedies.

7. Analytical Matrices and Tools.

8. Future Work and Conclusion.

From the B&N Reads Blog

Customer Reviews