Vtome.ru - электронная библиотека

Security of Ubiquitous Computing Systems Selected Topics

  • Добавил: literator
  • Дата: 16-05-2021, 19:46
  • Комментариев: 0
Security of Ubiquitous Computing Systems Selected TopicsНазвание: Security of Ubiquitous Computing Systems Selected Topics
Автор: Gildas Avoine, Julio Hernandez-Castro
Издательство: Springer
Год: 2021
Страниц: 283
Язык: английский
Формат: pdf, epub
Размер: 11.1 MB

Dear reader, we thank you for your interest in this book, which we expect will help you gain an understanding of the state of the art regarding the challenges and solutions in the security of ubiquitous computing systems. The definition of the field itself is not without controversy, but in this book we will use the term ‘ubiquitous computing’ or ‘IoT’ to refer to generally small, embedded devices with serious constraints in terms of memory and processing power, typically with no batteries but with good connection capabilities and, frequently, a number of sensors. This definition is, of course, flexible. Electronic passports, contactless transportation cards, personal assistants such as Amazon Echo but also new connected cars and fridges can fall within this definition.

In the Chapter 1 we focus on two important security challenges that naturally emerge for large scale systems composed of cheap devices implementing only symmetric cryptographic algorithms. First, we consider threats due to poor or malicious implementations of protocols, which enable data to be leaked from the devices to an adversary. We present solutions based on a watchdog concept - man-in-the-middle device that does not know the secrets of the communicating parties, but aims to destroy covert channels leaking secret information. Second, we deal with the problem of tracing devices by means of information exchanged while establishing a communication session. As solutions such as Diffie-Hellman key exchange are unavailable for such devices, implicit identity information might be transmitted in clear and thereby provide a perfect means for privacy violations. We show how to reduce such risks without retreating to asymmetric algorithms.

Lightweight cryptography aims to deploy cryptographic algorithms in resource-constrained devices such as embedded systems, RFID devices and sensor networks. The cryptographic community has done a significant amount of work in this area, including design, implementation and cryptanalysis of new lightweight cryptographic algorithms, together with efficient implementation of conventional cryptography algorithms in constrained environments.

The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains.

Contents:


Скачать Security of Ubiquitous Computing Systems Selected Topics












ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.