Chapter 7

Existing Security Scheme for IoT

Imed Romdhani

Abstract

This chapter introduces the main concepts involved in the security of the Internet of Things (IoT). These include confidentiality; integrity and authenticity; availability; nonrepudiation; and access control, which further includes identification, authentication, and authorization. The differences between security and privacy are described, as well as Kerckhoff’s principle of cryptography, and the use of cryptographic algorithms, which fall into two categories: symmetric and asymmetric protocols. A discussion of key management protocols follows, taking into account the approaches to management as well as criteria to assess it, including distribution, authentication, extensibility, ...

Get Securing the Internet of Things now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.