We a good story
Quick delivery in the UK

Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology

About Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology

This book focuses on the secure authentication of all entities involved in the Internet-of-Drones (IoD) environment. Once it becomes securely authenticated, then information broadcasting among each other shall never be compromised. No one forges any message from the open network channel. Its integrity and confidentiality have been preserved. Keeping in view this challenging task, we have first designed a security mechanism based on HMACSHA1 in chapter 1, a simple hash function-based security mechanism in chapter 2, a public key infrastructure (PKI) based protocol in chapter 3, identity, aggregate signature and paring cryptographic based security framework in chapter 4 and elliptic curve cryptographic (ECC) based scheme in chapter 5. We have designed system, network, adversary, and threat models in each chapter. We have also presented a critical literature review in each chapter, analyzed the security of each mechanism in that specific chapter, measured the performance, and compared the newly designed protocol with state-of-the-art protocol in terms of communication and computation costs.

Show more
  • Language:
  • English
  • ISBN:
  • 9789994986835
  • Binding:
  • Paperback
  • Pages:
  • 212
  • Published:
  • March 8, 2023
  • Dimensions:
  • 152x229x11 mm.
  • Weight:
  • 290 g.
Delivery: 1-2 weeks
Expected delivery: December 4, 2024

Description of Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology

This book focuses on the secure authentication of all entities involved in the Internet-of-Drones (IoD) environment. Once it becomes securely authenticated, then information broadcasting among each other shall never be compromised. No one forges any message from the open network channel. Its integrity and confidentiality have been preserved. Keeping in view this challenging task, we have first designed a security mechanism based on HMACSHA1 in chapter 1, a simple hash function-based security mechanism in chapter 2, a public key infrastructure (PKI) based protocol in chapter 3, identity, aggregate signature and paring cryptographic based security framework in chapter 4 and elliptic curve cryptographic (ECC) based scheme in chapter 5. We have designed system, network, adversary, and threat models in each chapter. We have also presented a critical literature review in each chapter, analyzed the security of each mechanism in that specific chapter, measured the performance, and compared the newly designed protocol with state-of-the-art protocol in terms of communication and computation costs.

User ratings of Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology



Find similar books
The book Confidentiality, Integrity and Authentication (Cia) for Internet-Of-Drones (Iod) Technology can be found in the following categories:

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.