Chapter 4

IoT Node Authentication

Shancang Li

Abstract

This chapter examines solutions to prevent leakage of private information and harmful actuating activities by means of peer authentication and secure data transmission between Internet of Things (IoT) nodes and servers. The chapter discusses commonly used security protection technologies in constrained IoT environments, including security goals in IoT, public-key-based authentication, identity-based authentication, encryption and digital signatures, lightweight cryptography primitives in IoT, secure enabling techniques for resource-constrained IoT, and existing security solutions in IoT.

Keywords

Internet of things (IoT) nodes; public-key encryption; identity-based authentication; cryptography ...

Get Securing the Internet of Things now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.