Skip to Content
Securing the Internet of Things
book

Securing the Internet of Things

by Shancang Li, Li Da Xu
January 2017
Intermediate to advanced
154 pages
4h 32m
English
Syngress
Content preview from Securing the Internet of Things
Chapter 4

IoT Node Authentication

Shancang Li

Abstract

This chapter examines solutions to prevent leakage of private information and harmful actuating activities by means of peer authentication and secure data transmission between Internet of Things (IoT) nodes and servers. The chapter discusses commonly used security protection technologies in constrained IoT environments, including security goals in IoT, public-key-based authentication, identity-based authentication, encryption and digital signatures, lightweight cryptography primitives in IoT, secure enabling techniques for resource-constrained IoT, and existing security solutions in IoT.

Keywords

Internet of things (IoT) nodes; public-key encryption; identity-based authentication; cryptography ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Internet of Things Security

Practical Internet of Things Security

Brian Russell, Drew Van Duren
Internet of Things

Internet of Things

Rajkumar Buyya, Amir Vahid Dastjerdi
Internet of Things

Internet of Things

S. Velliangiri, Sathish A.P. Kumar, P. Karthikeyan
Internet of Things

Internet of Things

Maciej Kranz

Publisher Resources

ISBN: 9780128045053