Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges
by
Faisal, Mohammad
, Khan, Muhammad Sajjad
, Ali, Ikram
, Kim, Junsu
, Kim, Su Min
in
Algorithms
/ Communication
/ Comparative studies
/ Computation
/ Cryptography
/ Cybersecurity
/ Cyberterrorism
/ Data security
/ Digital signatures
/ Financial services industry
/ Graph theory
/ Information storage and retrieval
/ Internet of Things
/ Mathematical analysis
/ Matrix methods
/ Modules
/ Security services
/ Software
/ Trust
/ Trustworthiness
2020
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges
by
Faisal, Mohammad
, Khan, Muhammad Sajjad
, Ali, Ikram
, Kim, Junsu
, Kim, Su Min
in
Algorithms
/ Communication
/ Comparative studies
/ Computation
/ Cryptography
/ Cybersecurity
/ Cyberterrorism
/ Data security
/ Digital signatures
/ Financial services industry
/ Graph theory
/ Information storage and retrieval
/ Internet of Things
/ Mathematical analysis
/ Matrix methods
/ Modules
/ Security services
/ Software
/ Trust
/ Trustworthiness
2020
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges
by
Faisal, Mohammad
, Khan, Muhammad Sajjad
, Ali, Ikram
, Kim, Junsu
, Kim, Su Min
in
Algorithms
/ Communication
/ Comparative studies
/ Computation
/ Cryptography
/ Cybersecurity
/ Cyberterrorism
/ Data security
/ Digital signatures
/ Financial services industry
/ Graph theory
/ Information storage and retrieval
/ Internet of Things
/ Mathematical analysis
/ Matrix methods
/ Modules
/ Security services
/ Software
/ Trust
/ Trustworthiness
2020
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges
Journal Article
Establishment of Trust in Internet of Things by Integrating Trusted Platform Module: To Counter Cybersecurity Challenges
2020
Request Book From Autostore
and Choose the Collection Method
Overview
With the increasing day-to-day acceptance of IOT computing, the issues related to it are also getting more attention. The current IOT computing infrastructure brings some security challenges concerned with the users/customers and CSP. The users can store their confidential data at IOT storage and can access them anytime when they need. Lack of trust exists among IOT users and between IOT users and CSP. The prevention of this risk is a big research issue and it needs to be solved. There is a need for trusted IOT computing in recent times to provide trusted services. Here, we propose the integration of TPM in IOT computing to performs cryptographic operations and provide hardware-based security. In this domain, different schemes and methods have been proposed to build trust in IOT computing, but the suitable solution has not been presented by these schemes because these schemes lack in terms of some security services. A comparative study based on trusted computing schemes has also been presented in this paper along with different implementations of critical analysis. Our study is based on an overview of the main issues and summarizing the literature along with their strengths and limitations. In the end, we integrated the trusted platform module in the IOT architecture to establish the trust in IOT computing and to enhance the cybersecurity challenges and evaluated it with the help of mathematical/algorithms/graph theory/matrices and logical diagrams.
Publisher
Hindawi Publishing Corporation,Hindawi,John Wiley & Sons, Inc,Wiley
Subject
This website uses cookies to ensure you get the best experience on our website.