Role of Cryptography and Its Challenges in Integrating Secured IoT Products

Industries, factories, hospitals, and homes are using Internet of Things (IoT) to monitor, analyse, and control the physical objects over the internet. Simple sensors to advanced machines connected to cloud need network security even if there is no secure data or privacy issue. But many manufacturer...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Citharthan, D., Varatharaj, M., Rajan, D. Palanivel
Format: Buchkapitel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Industries, factories, hospitals, and homes are using Internet of Things (IoT) to monitor, analyse, and control the physical objects over the internet. Simple sensors to advanced machines connected to cloud need network security even if there is no secure data or privacy issue. But many manufacturers are unfamiliar with network security issues with their IoT-enabled products by which they are making avoidable errors that can even harm the customers or users. Attacks in the network will be performed by network attackers, where they will access the data or modify the data or destroy the data. Cryptography is basically a study of encryption, where the data will be secured during transmission and promises features such as confidentiality, authentication, integrity, and non-repudiation. This chapter focuses on the implementation of data transmission in secured IoT products, which includes provisioning process, device authentication process, encryption process (using symmetric and asymmetric keys), signature generation, and the Public Key Infrastructure (PKI) assists with asymmetric keys. In the provisioning process, certificate (with public key) and private key are deployed into the IoT product. In the process of device authentication, it is possible to check the identity of IoT product. Once the identity of IoT product is known, ephemeral secret key can deploy into the IoT product, and secure transmission of data can be accomplished using encryption process, which ensures the data's confidentiality. Signature generation incorporates the hashing and encryption process, which ensures data integrity and authenticity. This chapter also discusses the main challenges of cryptography and future directions of cryptography in integrating secured IoT products. This chapter focuses on the implementation of data transmission in secured Internet of Things (IoT) products, which includes provisioning process, device authentication process, encryption process, signature generation, and the Public Key Infrastructure assists with asymmetric keys. It discusses the main challenges of cryptography and future directions of cryptography in integrating secured IoT products. Cryptography is basically a study of encryption, where the data will be secured during transmission and promises features such as confidentiality, authentication, integrity, and non-repudiation. To protect the data from active attacks and passive attacks, it is necessary to provide network security services. Crypt
DOI:10.1201/9781003032441-3