Computing & Internet      Programming

Secured Authentication System for Internet of Things

(0 reviews)
Paper Back
£67.99
£61.39
Condition
Quantity
(134 available)
Share
Book Details
Language
English
Publishers
GRIN Verlag; 1. edition (27 Mar. 2024)
Weight
0.18 KG
Publication Date
27/03/2024
ISBN-10
338901408X
Pages
130 pages
ISBN-13
9783389014080
Dimensions
14.81 x 0.79 x 21.01 cm
SKU
9783389014080
Author Name
Gowtham Mohan (Author)
Read More

Reviews & Ratings

out of 5.0
(0 reviews)
There have been no reviews for this product yet.
Academic Paper from the year 2024 in the subject Computer Sciences - Internet of Things, IOT, grade: A, Free University of Berlin (The National Institute of Engineering, Mysore), course: Ph. D, language: English, abstract: The key objectives defined in this thesis are given as follows: To analyse the different security breaches in the IoT Ecosystem.

To develop a lightweight cryptographic scheme for secured Authentication in IoT. To develop a multilevel security model by using Enhanced Cryptosystem for secured Authentication in IoT.

To ensure reliable and secure communication and access across multiple co-operatively communicating devices in IoT ecosystems ensuring optimal security and authentication system is must. Though, IoT demands ensuring security and authentication for both "device level security" and "data security under communication".

Noticeably, the device level security addresses attack resilience from any unwanted or unexpected intruder by applying certain authentication variables or key agreement policies. However, in the last few years, the events pertaining to smart card loss attack (SCLA), Brute-Force attack, impersonation attack, data sniffing attack etc.

, have questioned major at-hand security solutions. The irony is, in the majority of IoT systems, the access information or the key agreement information is saved or preserved onto the local memory, which often broadens the horizon for data loss, or attack.

In such classical approaches the possibility of SCLA, Impersonation and Brute-force attack can't be neglected. And therefore, ensuring both system level access authentication is inevitable.

In other words, strengthening data security in IoT systems is equally significant like device level security and authentication. Once system considers both data level security as well as device level authentication system retaining quality of content and hardware efficiency becomes equally inevitable.

On the other hand, maintaining efficacy of the security. .

Frequently Bought Products

Product Queries (0)

Login Or Registerto submit your questions to seller

Other Questions

No none asked to seller yet

Bookiyos Books Solutions - Quality Books, Unbeatable Prices

Bookiyos Books Solutions is your premier online bookstore offering a vast selection of over 5 crore books. Whether you're looking for the latest releases, timeless classics, or rare finds, we have something for every reader. Our platform serves customers worldwide, including the USA, UK, and Europe, with fast delivery and easy return policies to ensure a hassle-free shopping experience. Discover daily updates, exclusive deals, and a comprehensive collection of books that cater to all your reading needs. Shop with confidence at Bookiyos, where quality books and unbeatable prices meet.

Why Choose Bookiyos?

Extensive Inventory: New, old, and rare books available.
Fast Delivery: Same or next-day shipping.
Easy Returns: Hassle-free refund and return policies.
Global Reach: Serving customers in the USA, UK, Europe, and beyond.
Daily Updates: Thousands of new titles added every day.
Join our community of book lovers and start your literary journey with Bookiyos Books Solutions today!