January 2017
Intermediate to advanced
154 pages
4h 32m
English
Shancang Li
This chapter examines solutions to prevent leakage of private information and harmful actuating activities by means of peer authentication and secure data transmission between Internet of Things (IoT) nodes and servers. The chapter discusses commonly used security protection technologies in constrained IoT environments, including security goals in IoT, public-key-based authentication, identity-based authentication, encryption and digital signatures, lightweight cryptography primitives in IoT, secure enabling techniques for resource-constrained IoT, and existing security solutions in IoT.
Internet of things (IoT) nodes; public-key encryption; identity-based authentication; cryptography ...