Cryptographic Protocols for Internet of Things (IoT) Security Lightweight Schemes and Practical Deployment

Cryptographic Protocols for Internet of Things (IoT) Security Lightweight Schemes and Practical Deployment

Mohammad Alauthman, Amjad Aldweesh, Ahmad Al-Qerem, Ali Younis Al Maqousi, Ammar Almomani, Mouhammd Alkasassbeh
Copyright: © 2024 |Pages: 18
DOI: 10.4018/979-8-3693-5330-1.ch018
OnDemand:
(Individual Chapters)
Available
$33.75
List Price: $37.50
10% Discount:-$3.75
TOTAL SAVINGS: $3.75

Abstract

The proliferation of Internet of Things (IoT) devices has revolutionized many industries and daily life, however these resource-constrained devices also present significant cybersecurity challenges. Traditional cryptographic protocols are often too resource intensive for IoT use cases. This chapter provides a comprehensive review of lightweight cryptographic schemes tailored for IoT security, including authentication, data integrity and confidentiality protocols leveraging lightweight hash functions and elliptic curve cryptography (ECC). Practical deployment considerations, threat modeling, and security analysis methodologies for IoT systems are also discussed. Finally, research gaps and future directions are highlighted to guide continued innovation of efficient and secure cryptographic solutions enabling the ongoing growth of the IoT ecosystem.
Chapter Preview

Complete Chapter List

Search this Book:
Reset