Batch Verification of Digital Signatures in IoT

Batch Verification of Digital Signatures in IoT

Apurva S. Kittur

0,00 €
IVA incluido
Consulta disponibilidad
Editorial:
Draft2Digital
Año de edición:
2024
ISBN:
9781835800966

Selecciona una librería:

  • Librería Perelló (Valencia)
  • Librería Aciertas (Toledo)
  • El AlmaZen del Alquimista (Sevilla)
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Donde los libros
  • Librería Proteo (Málaga)

Internet of Things (IoT) is coined in 1999 by Kevin Ashton. IoT can be defined in many ways. ’Internet’ refers to the interconnectivity of devices to create a network, and ’Things’ refers to the embedded objects or devices that can connect to the Internet. One way of defining is, ’it is a network of sensors and smart devices which sense the data which is further processed and analysed in an ubiquitous network.’ IoT has seen rapid development in recent years because of its ’smartness.’ The various applications of IoT include Smart City, Smart Home, Smart Health, Transport and Logistic applications, Weather monitoring and Forecast etc. These applications have millions of devices generating large volumes of data. The rapid development of IoT has increased the curiosity of the attackers. The devices (nodes) in the IoT network have weak security protocols because of their limited computation ability and energy. Hence the nodes of the network are vulnerable to various kinds of attacks. The IoT network has sensors, actuators, controllers, gateway heads, sink, etc. For our reference, we have broadly classified these devices into sensor nodes and gateway nodes. Sensor nodes includes low computation end devices such as sensors, actuators etc., and gateway node includes gateway, sink, cluster head etc. The gateway nodes have better computation power as compared to sensor nodes. But the overall network is not competent to handle complex cryptographic operations. Signature is a unique way to identify a signer. The authenticity of a person/ organization/ entity is verified through its signature. A signature can be a handwritten one, or it can be a digital one. Digital signatures are used to verify the content of the received message and the signer’s identity in digital communication. The exponential growth of Internet technology has led to the growth in usage of digital signatures. Every signer generates a unique signature using his/her private key. The verifier possesses the public key of the signer and verifies the signature using the same. The signature generated by the signer can be verified by everyone who has access to the public key. The concept of batch verification is introduced to reduce the verification time and complexity. Batch verification schemes verify multiple signatures together with signatures either signed by single or multiple signers.

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
    Disponible

    255,72 €

  • Current Trends in Cyber Security
    Irina du Quenoy / Neil Kent
    This groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors -- all leaders in their fields -- have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify pat...
    Disponible

    258,62 €

  • TLS Cryptography In-Depth
    Dr. Paul Duplys / Dr. Roland Schmitz
    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks worked, and how they were fixed- Discover the inner workings of modern cryptography and its application within TLS- Purchase of the...
    Disponible

    73,25 €

  • A Secured Framework for Enhanced and Efficient Communication in IoT Ecosystem
    V S Saranya
    IoT security technologies ensure the protection of devices and networks associated with Internet of Things (IoT) ecosystem. IoT affords internet connectivity amid various inter related devices. It presents a unique identification and automates data transfer within the network. There are possibilities for severe vulnerabilities for the devices which are allowed with internet con...
  • Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms
    In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the intricate world of blockchain, offering a comprehensive exploration of its various dimensions. At its core, blockchain disrupts the ...
    Disponible

    373,22 €

  • Innovative Machine Learning Applications for Cryptography
    Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is unden...
    Disponible

    393,00 €