Karthika, D. and Kalaiselvi, K (2022) IoT Protocol Security Mechanisms. In: Trust‐Based Communication Systems for Internet of Things Applications. Wiley, pp. 29-51. ISBN 9781119896746
Full text not available from this repository. (Request a copy)Abstract
The Internet of Things (IoT) is the development production of computer science and communication technology. In recent years, with the development of computer science, communication technology, and perception recognition technology, the network of things has made a great breakthrough. As IoT is broadly used in many fields, the security of IoT is becoming especially important and will have great effects on the industry of IoT. Current Internet security protocols rely on a well‐known and widely trusted suite of cryptographic algorithms: the RivestShamir‐Adelman (RSA) asymmetric algorithm for digital signatures, the DiffieHellman (DH) asymmetric key agreement algorithm, the Advanced Encryption Standard (AES) block cipher for confidentiality, and the SHA1 and SHA‐256 secure hash algorithms. This chapter will focus on security concerns, amongst other subjects, and IoT based on the Internet and web security problems are also mentioned. This description is articulated explicitly in different spaces by the protection of the Item Network. The security concerns of the IoT network are strongly connected to its overall application. The IoT can find applications in many fields from the earliest wireless sensor networks such as the smart grid, smart healthcare, smart agriculture, smart logistics, and so on with the suitable security mechanism.
Item Type: | Book Section |
---|---|
Subjects: | Computer Applications > Software Development |
Divisions: | Computer Applications |
Depositing User: | Mr IR Admin |
Date Deposited: | 14 Sep 2024 07:28 |
Last Modified: | 14 Sep 2024 07:28 |
URI: | https://ir.vistas.ac.in/id/eprint/5998 |