Norges billigste bøker

Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology

Om Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology

This book focuses on the secure authentication of all entities involved in the Internet-of-Drones (IoD) environment. Once it becomes securely authenticated, then information broadcasting among each other shall never be compromised. No one forges any message from the open network channel. Its integrity and confidentiality have been preserved. Keeping in view this challenging task, we have first designed a security mechanism based on HMACSHA1 in chapter 1, a simple hash function-based security mechanism in chapter 2, a public key infrastructure (PKI) based protocol in chapter 3, identity, aggregate signature and paring cryptographic based security framework in chapter 4 and elliptic curve cryptographic (ECC) based scheme in chapter 5. We have designed system, network, adversary, and threat models in each chapter. We have also presented a critical literature review in each chapter, analyzed the security of each mechanism in that specific chapter, measured the performance, and compared the newly designed protocol with state-of-the-art protocol in terms of communication and computation costs.

Vis mer
  • Språk:
  • Engelsk
  • ISBN:
  • 9789994986835
  • Bindende:
  • Paperback
  • Sider:
  • 212
  • Utgitt:
  • 9. mars 2023
  • Dimensjoner:
  • 152x229x11 mm.
  • Vekt:
  • 290 g.
  Gratis frakt
Leveringstid: 2-4 uker
Forventet levering: 20. januar 2025

Beskrivelse av Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology

This book focuses on the secure authentication of all entities involved in the Internet-of-Drones (IoD) environment. Once it becomes securely authenticated, then information broadcasting among each other shall never be compromised. No one forges any message from the open network channel. Its integrity and confidentiality have been preserved. Keeping in view this challenging task, we have first designed a security mechanism based on HMACSHA1 in chapter 1, a simple hash function-based security mechanism in chapter 2, a public key infrastructure (PKI) based protocol in chapter 3, identity, aggregate signature and paring cryptographic based security framework in chapter 4 and elliptic curve cryptographic (ECC) based scheme in chapter 5. We have designed system, network, adversary, and threat models in each chapter. We have also presented a critical literature review in each chapter, analyzed the security of each mechanism in that specific chapter, measured the performance, and compared the newly designed protocol with state-of-the-art protocol in terms of communication and computation costs.

Brukervurderinger av Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology



Finn lignende bøker
Boken Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology finnes i følgende kategorier:

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.