Internet of Things Security / (Record no. 44025)

MARC details
000 -LEADER
fixed length control field 05615nam a22002297a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250212114927.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250212b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781032605210
041 ## - LANGUAGE CODE
Language English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Item number PAT
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Patel, Chintan
245 ## - TITLE STATEMENT
Title Internet of Things Security /
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Baco Raton :
Name of publisher, distributor, etc Taylor & Francis Books India Pvt. Ltd,
Date of publication, distribution, etc 2019.
300 ## - PHYSICAL DESCRIPTION
Extent 238 pages :
505 ## - FORMATTED CONTENTS NOTE
Title Cover<br/>Half Title<br/>Title<br/>Copyright<br/>Dedication<br/>Contents<br/>Foreword<br/>Preface<br/>Acknowledgment<br/>Authors<br/>1 IoT: An Overview<br/>1.1 Abstract<br/>1.2 Introduction<br/>1.3 IoT Vision<br/>1.3.1 Application-Oriented<br/>1.3.2 Things Oriented<br/>1.3.3 Communication Oriented<br/>1.3.4 Research-Oriented<br/>1.3.5 Security Oriented<br/>1.4 IoT Reference Architecture<br/>1.4.1 Four Layered Architecture<br/>1.4.2 Seven layered architecture by CISCO<br/>1.4.3 IoT Nuts and Bolts<br/>1.5 IoT Security<br/>1.5.1 An overview<br/>1.5.2 An Architecture<br/>1.6 IoT Authentication Models<br/>1.7 Light weight cryptography<br/>1.7.1 An overview<br/>1.7.2 A literature study<br/>1.8 IoT historical approach<br/>1.9 IoT futuristic approach<br/>1.10 Summary<br/>1.11 References<br/>2 Mathematical Foundations<br/>2.1 Abstract<br/>2.2 Elliptic Curve Cryptography<br/>2.2.1 Foundation<br/>2.2.1.1 Basics of Polynomial Expressions<br/>2.2.1.2 Polynomial Curve fitting<br/>2.2.1.3 Algebraic Set<br/>2.2.1.4 Groups<br/>2.2.1.5 Rings<br/>2.2.1.6 Fields and Finite fields<br/>2.2.1.7 GCD, Modular arithmetic, Prime numbers<br/>2.2.1.8 Basics of discrete logarithms<br/>2.2.1.9 Polynomial arithmetic on prime field and extension field<br/>2.3 Diffie-Hellman key Exchange and Elgamal scheme<br/>2.3.1 Diffie-Hellman key exchange<br/>2.3.2 Elgamal crypto system<br/>2.4 Elliptic Curve Cryptography Operations<br/>2.4.1 Elliptic curve over prime field<br/>2.4.2 Elliptic curve over Extension field<br/>2.4.3 Elliptic curve Diffie-Hellman problem(ECDHP) and Discrete logarithm problem (ECDLP)<br/>2.4.4 Message Encoding and Decoding as Elliptic curve points<br/>2.4.5 Message Encryption and Decryption on Elliptic curve points<br/>2.5 Scalar multiplication problem<br/>2.5.1 Scalar multiplication MSB First bit<br/>2.5.2 Scalar multiplication LSB First bit<br/>2.5.3 Montgomery Scalar Multiplication Operation<br/>2.6 Hash-based operations<br/>2.6.1 Hash function<br/>2.6.2 Hash chains and its calculation<br/>2.6.3 Bio hashing<br/>2.7 RSA Algorithms<br/>2.8 Bilinear pairing system<br/>2.8.1 Bilinear pairing system decision Diffie-Hellman problem<br/>2.9 Chebyshev chaotic Map:<br/>2.10 Introduction to block chain technology<br/>2.11 Summary<br/>2.12 References<br/>3 IoT Authentication<br/>3.1 Abstract<br/>3.2 Authentication layered architecture<br/>3.2.1 Introduction<br/>3.2.2 Physical layer authentication<br/>3.2.3 Network layer authentications<br/>3.2.4 Data processing layer authentication<br/>3.2.5 Application layer authentication<br/>3.3 IoT node authentication<br/>3.3.1 Introduction<br/>3.3.2 Architecture<br/>3.3.3 Phases<br/>3.3.3.1 System setup phase by gateway node<br/>3.3.3.2 Sensors and user registrations<br/>3.3.3.3 Key exchange phase<br/>3.3.3.4 Login phase and authentication<br/>3.3.3.5 Password update phase<br/>3.3.3.6 Device adding phase<br/>3.4 Cloud centric IoT authentication architecture<br/>3.5 Authentication Issues for Resource constrained IoT Devices<br/>3.6 Application oriented authentication scenarios<br/>3.6.1 Health care<br/>3.6.2 Manufacturing and logistics<br/>3.6.3 Grid<br/>3.6.4 Agriculture<br/>3.7 Summary<br/>3.8 References<br/>4 Single Server Authentication<br/>4.1 Abstract<br/>4.2 Introduction<br/>4.3 Client-server Model<br/>4.3.1 DTLS Protocol<br/>4.3.2 MQTT Protocol<br/>4.4 Adversary Model<br/>4.5 Phases<br/>4.5.1 Server initialization phase<br/>4.5.2 User registration phase<br/>4.5.3 Login phase<br/>4.5.4 Authentication and key agreement phase<br/>4.5.5 Password updating phase<br/>4.6 Summary<br/>4.7 References<br/>5 Multi-Server Authentication<br/>5.1 Abstract<br/>5.2 Introduction<br/>5.2.1 Challenges in IoT multi-server environment<br/>5.3 Model of adversary<br/>5.4 Phases<br/>5.4.1 Initialization phase by registration center<br/>5.4.2 Server registration<br/>5.4.3 User registration<br/>5.4.4 User login<br/>5.4.5 User authentication and key exchange<br/>5.4.6 User password updating phase<br/>5.5 Summary<br/>5.6 References<br/>6 Attacks and Remedies<br/>6.1 Abstract<br/>6.2 Introduction<br/>6.3 User Anonymity<br/>6.4 Perfect forward secrecy<br/>6.5 Replay attack<br/>6.6 Off-line password guessing attack<br/>6.7 User impersonation attack<br/>6.8 Man in the Middle attack<br/>6.9 Smart card loss and stolen attack<br/>6.10 Server spoofing attack<br/>6.11 Denial of Service attack and Distributed DoS<br/>6.12 Summary<br/>6.13 References<br/>7 Analytical Matrices and Tools<br/>7.1 Abstract<br/>7.2 Analytical Matrices<br/>7.2.1 Time complexity<br/>7.2.2 Space complexity<br/>7.2.3 Energy Consumption<br/>7.3 Analytical tools<br/>7.3.1 AVISPA<br/>7.3.2 BANLogic<br/>7.3.3 Scyther<br/>7.3.4 ProVerif<br/>7.4 Summary<br/>7.5 References<br/>8 Future Work and Conclusions<br/>8.1 Future Work<br/>8.2 Conclusions<br/>Index<br/>
520 ## - SUMMARY, ETC.
Summary, etc Most of the devices in the Internet of Things will be battery powered sensor devices. All the operations done on battery powered devices require minimum computation. Secure algorithms like RSA become useless in the Internet of Things environment. Elliptic curve based cryptography emerges as a best solution for this problem because it provides higher security in smaller key size compare to RSA. This book focuses on the use of Elliptic Curve Cryptography with different authentication architectures and authentication schemes using various security algorithms. It also includes a review of the math required for security and understanding Elliptic Curve Cryptography.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Internet of Things – Security measures
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks – Security measures
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Doshi, Nishant
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type General Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Generalia 12/02/2025   005.8 PAT 51701 12/02/2025 12/02/2025 General Books