IoT Node Authentication
Shancang Li
Abstract
This chapter examines solutions to prevent leakage of private information and harmful actuating activities by means of peer authentication and secure data transmission between Internet of Things (IoT) nodes and servers. The chapter discusses commonly used security protection technologies in constrained IoT environments, including security goals in IoT, public-key-based authentication, identity-based authentication, encryption and digital signatures, lightweight cryptography primitives in IoT, secure enabling techniques for resource-constrained IoT, and existing security solutions in IoT.
Keywords
Internet of things (IoT) nodes; public-key encryption; identity-based authentication; cryptography ...
Get Securing the Internet of Things now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.