Udvidet returret til d. 31. januar 2025

Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology - Saeed Ullah Jan - Bog

Bag om Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology

This book focuses on the secure authentication of all entities involved in the Internet-of-Drones (IoD) environment. Once it becomes securely authenticated, then information broadcasting among each other shall never be compromised. No one forges any message from the open network channel. Its integrity and confidentiality have been preserved. Keeping in view this challenging task, we have first designed a security mechanism based on HMACSHA1 in chapter 1, a simple hash function-based security mechanism in chapter 2, a public key infrastructure (PKI) based protocol in chapter 3, identity, aggregate signature and paring cryptographic based security framework in chapter 4 and elliptic curve cryptographic (ECC) based scheme in chapter 5. We have designed system, network, adversary, and threat models in each chapter. We have also presented a critical literature review in each chapter, analyzed the security of each mechanism in that specific chapter, measured the performance, and compared the newly designed protocol with state-of-the-art protocol in terms of communication and computation costs.

Vis mere
  • Sprog:
  • Engelsk
  • ISBN:
  • 9789994986835
  • Indbinding:
  • Paperback
  • Sideantal:
  • 212
  • Udgivet:
  • 9. marts 2023
  • Størrelse:
  • 152x229x11 mm.
  • Vægt:
  • 290 g.
  • 2-3 uger.
  • 6. december 2024
På lager

Normalpris

  • BLACK NOVEMBER

Medlemspris

Prøv i 30 dage for 45 kr.
Herefter fra 79 kr./md. Ingen binding.

Beskrivelse af Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology

This book focuses on the secure authentication of all entities involved in the Internet-of-Drones (IoD) environment. Once it becomes securely authenticated, then information broadcasting among each other shall never be compromised. No one forges any message from the open network channel. Its integrity and confidentiality have been preserved. Keeping in view this challenging task, we have first designed a security mechanism based on HMACSHA1 in chapter 1, a simple hash function-based security mechanism in chapter 2, a public key infrastructure (PKI) based protocol in chapter 3, identity, aggregate signature and paring cryptographic based security framework in chapter 4 and elliptic curve cryptographic (ECC) based scheme in chapter 5. We have designed system, network, adversary, and threat models in each chapter. We have also presented a critical literature review in each chapter, analyzed the security of each mechanism in that specific chapter, measured the performance, and compared the newly designed protocol with state-of-the-art protocol in terms of communication and computation costs.

Brugerbedømmelser af Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology



Find lignende bøger
Bogen Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology findes i følgende kategorier:

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.