Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
by
Attkan, Ankit
, Ranga, Virender
in
Artificial intelligence
/ Authentication
/ Blockchain
/ Complexity
/ Computational Intelligence
/ Cryptography
/ Cybersecurity
/ Data Structures and Information Theory
/ Data transfer (computers)
/ Engineering
/ Internet of Things
/ Survey and State of the Art
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
by
Attkan, Ankit
, Ranga, Virender
in
Artificial intelligence
/ Authentication
/ Blockchain
/ Complexity
/ Computational Intelligence
/ Cryptography
/ Cybersecurity
/ Data Structures and Information Theory
/ Data transfer (computers)
/ Engineering
/ Internet of Things
/ Survey and State of the Art
2022
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
by
Attkan, Ankit
, Ranga, Virender
in
Artificial intelligence
/ Authentication
/ Blockchain
/ Complexity
/ Computational Intelligence
/ Cryptography
/ Cybersecurity
/ Data Structures and Information Theory
/ Data transfer (computers)
/ Engineering
/ Internet of Things
/ Survey and State of the Art
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
Journal Article
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
2022
Request Book From Autostore
and Choose the Collection Method
Overview
The recent years have garnered huge attention towards the Internet of Things (IoT) because it enables its consumers to improve their lifestyles and professionally keep up with the technological advancements in the cyber-physical world. The IoT edge devices are heterogeneous in terms of the technology they are built on and the storage file formats used. These devices require highly secure modes of mutual authentication to authenticate each other before actually sending the data. Mutual authentication is a very important aspect of peer-to-peer communication. Secure session keys enable these resource-constrained devices to authenticate each other. After successful authentication, a device can be authorized and can be granted access to shared resources. The need for validating a device requesting data transfer to avoid data privacy breaches that may compromise confidentiality and integrity. Blockchain and artificial intelligence (AI) both are extensively being used as an integrated part of IoT networks for security enhancements. Blockchain provides a decentralized mechanism to store validated session keys that can be allotted to the network devices. Blockchain is also used to load balance the stressing edge devices during low battery levels. AI on the other hand provides better learning and adaptiveness towards IoT attacks. The integration of newer technologies in IoT key management yields enhanced security features. In this article, we systematically survey recent trending technologies from an IoT security point of view and discuss traditional key security mechanisms. This article delivers a comprehensive quality study for researchers on authentication and session keys, integrating IoT with blockchain and AI-based authentication in cybersecurity.
Publisher
Springer International Publishing,Springer Nature B.V
This website uses cookies to ensure you get the best experience on our website.