Зарегистрироваться
Восстановить пароль
FAQ по входу

Sniatala P., Iyengar S.S., Ramani S.K. Evolution of Smart Sensing Ecosystems with Tamper Evident Security

  • Файл формата pdf
  • размером 3,90 МБ
  • Добавлен пользователем
  • Описание отредактировано
Sniatala P., Iyengar S.S., Ramani S.K. Evolution of Smart Sensing Ecosystems with Tamper Evident Security
Springer, 2022. — 158 p. — ISBN 978-3-030-77763-0.
This book presents an overview on security and privacy issues in dynamic sensor networks and Internet of Things (IoT) networks and provides a novel tamper evident technique to counter and defend against these security related issues. The mission of this book is to explain the evolution of techniques and strategies in securing information transfer and storage thus facilitating a digital transition towards the modern tamper evident systems. The goal is also to aid business organizations that are dependent on the analysis of the large volumes of generated data in securing and addressing the associated growing threat of attackers relentlessly waging attacks and the challenges in protecting the confidentiality, integrity and provenance of data. The book also provides a comprehensive insight into the secure communication techniques and tools that have evolved and the impact they have had in supporting and flourishing the business through the cyber era. This book also includes chapters that discuss the most primitive encryption schemes to the most recent use of homomorphism in ensuring the privacy of the data thus leveraging greater use of new technologies like cloud computing and others.
Growth of Sensory Devices and Their Proliferation into Daily Life
Smart Objects in Cyber-Physical Systems
IoT Security
Securing the Internet-of-Things Enabled Smart Environments
Understanding the Smart Systems: IoT Protocol Stack
Onboarding New IoT Devices
Cryptosystems: Foundations and the Current State-of-the-Art
Symmetric Key Cryptography
Asymmetric Key Cryptography
Modern Encryption Schemes
Homomorphic Encryption
Popular Homomorphic Encryption Schemes
Industrial Involvement in the Use of Homomorphic Encryption
Creating a Tamper Evident System for the Cyber Era
Feasibility and Performance Analysis
Implementation Details
Future Directions
Quantum Cryptography
Quantum Tools
Applications
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация