Marknadens största urval
Snabb leverans

Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology

Om Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology

This book focuses on the secure authentication of all entities involved in the Internet-of-Drones (IoD) environment. Once it becomes securely authenticated, then information broadcasting among each other shall never be compromised. No one forges any message from the open network channel. Its integrity and confidentiality have been preserved. Keeping in view this challenging task, we have first designed a security mechanism based on HMACSHA1 in chapter 1, a simple hash function-based security mechanism in chapter 2, a public key infrastructure (PKI) based protocol in chapter 3, identity, aggregate signature and paring cryptographic based security framework in chapter 4 and elliptic curve cryptographic (ECC) based scheme in chapter 5. We have designed system, network, adversary, and threat models in each chapter. We have also presented a critical literature review in each chapter, analyzed the security of each mechanism in that specific chapter, measured the performance, and compared the newly designed protocol with state-of-the-art protocol in terms of communication and computation costs.

Visa mer
  • Språk:
  • Engelska
  • ISBN:
  • 9789994986835
  • Format:
  • Häftad
  • Sidor:
  • 212
  • Utgiven:
  • 9. mars 2023
  • Mått:
  • 152x229x11 mm.
  • Vikt:
  • 290 g.
  Fri leverans
Leveranstid: 2-4 veckor
Förväntad leverans: 19. december 2024
Förlängd ångerrätt till 31. januari 2025

Beskrivning av Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology

This book focuses on the secure authentication of all entities involved in the Internet-of-Drones (IoD) environment. Once it becomes securely authenticated, then information broadcasting among each other shall never be compromised. No one forges any message from the open network channel. Its integrity and confidentiality have been preserved. Keeping in view this challenging task, we have first designed a security mechanism based on HMACSHA1 in chapter 1, a simple hash function-based security mechanism in chapter 2, a public key infrastructure (PKI) based protocol in chapter 3, identity, aggregate signature and paring cryptographic based security framework in chapter 4 and elliptic curve cryptographic (ECC) based scheme in chapter 5. We have designed system, network, adversary, and threat models in each chapter. We have also presented a critical literature review in each chapter, analyzed the security of each mechanism in that specific chapter, measured the performance, and compared the newly designed protocol with state-of-the-art protocol in terms of communication and computation costs.

Användarnas betyg av Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology



Hitta liknande böcker
Boken Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology finns i följande kategorier:

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.