Читать книгу Trust-Based Communication Systems for Internet of Things Applications - Группа авторов - Страница 30

3
IoT Protocol Security Mechanisms

Оглавление

D. Karthika* and Dr. K. Kalaiselvi†

Department of Computer Applications, School of Computing Science, Vels Institute of Science, Technology & Advanced Studies (Formerly Vels University), Chennai, Tamil Nadu, India

Abstract

The Internet of Things (IoT) is the development production of computer science and communication technology. In recent years, with the development of computer science, communication technology, and perception recognition technology, the network of things has made a great breakthrough. As IoT is broadly used in many fields, the security of IoT is becoming especially important and will have great effects on the industry of IoT. Current Internet security protocols rely on a well-known and widely trusted suite of cryptographic algorithms: the Rivest-Shamir-Adelman (RSA) asymmetric algorithm for digital signatures, the Diffie-Hellman (DH) asymmetric key agreement algorithm, the Advanced Encryption Standard (AES) block cipher for confidentiality, and the SHA1 and SHA-256 secure hash algorithms. This chapter will focus on security concerns, amongst other subjects, and IoT based on the Internet and web security problems are also mentioned. This description is articulated explicitly in different spaces by the protection of the Item Network. The security concerns of the IoT network are strongly connected to its overall application. The IoT can find applications in many fields from the earliest wireless sensor networks such as the smart grid, smart healthcare, smart agriculture, smart logistics, and so on with the suitable security mechanism.

Keywords: IoT, WSN, security mechanism, encryption, decryption

Trust-Based Communication Systems for Internet of Things Applications

Подняться наверх