2022
DOI: 10.1007/s11227-022-04586-1
|View full text |Cite
|
Sign up to set email alerts
|

Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives

Abstract: The Internet of Things (IoT) is increasingly becoming widespread in different areas such as healthcare, transportation, and manufacturing. IoT networks comprise many diverse entities, including smart small devices for capturing sensitive information, which may be attainable targets for malicious parties. Thus security and privacy are of utmost importance. To protect the confidentiality of data handled by IoT devices, conventional cryptographic primitives have generally been used in various IoT security solutio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 123 publications
0
1
0
Order By: Relevance
“…One of the major challenges in large use of asymmetric cryptography is reliability of key sharing, this bootstrap step is an issue opening a lot of threat opportunities, in order to remedy to this, digital certificates come to the game, they offer a sort of numerical identity cards in which information like global identifier, public key, and so on, on the holder can be found. Here again digital signature is crucial, the deliverance of these certificates are ensured by trusted servers or authorities over the network which guarantee the integrity of the certificates by signing them with their private keys [28].…”
Section: Public Key Infrastructurementioning
confidence: 99%
“…One of the major challenges in large use of asymmetric cryptography is reliability of key sharing, this bootstrap step is an issue opening a lot of threat opportunities, in order to remedy to this, digital certificates come to the game, they offer a sort of numerical identity cards in which information like global identifier, public key, and so on, on the holder can be found. Here again digital signature is crucial, the deliverance of these certificates are ensured by trusted servers or authorities over the network which guarantee the integrity of the certificates by signing them with their private keys [28].…”
Section: Public Key Infrastructurementioning
confidence: 99%