DSpace logo

Please use this identifier to cite or link to this item: http://dspace.bits-pilani.ac.in:8080/jspui/handle/123456789/8724
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRao, Shreyas Suresh-
dc.date.accessioned2023-01-24T11:17:51Z-
dc.date.available2023-01-24T11:17:51Z-
dc.date.issued2020-06-
dc.identifier.urihttps://link.springer.com/chapter/10.1007/978-3-030-44407-5_4-
dc.identifier.urihttp://dspace.bits-pilani.ac.in:8080/xmlui/handle/123456789/8724-
dc.description.abstractWith the increase of Internet of Things (IoT) applications, the number of devices communicating over the Internet is also increasing. These devices are generating numerous amounts of sensitive data that are being communicated over an unprotected network. The manufacturers are providing the least preferences for the device-level security due to resource-constrained properties of the IoT devices. The existing research has shown large computational cryptographic solutions that both consume power and occupy more space on the device. Thereby, it is required to develop lightweight cryptographic solutions that are suitable for low-powered resources of IoT applications. In this chapter, a detailed study of various attacks that can be encountered on various layers of IoT architecture is generalized with possible lightweight measures. Also, threat modeling using Microsoft’s threat modeling tool is explained that helps in the early identification of threats in IoT applications. Finally, security practices that should be followed by enterprise IoT are covered.en_US
dc.language.isoenen_US
dc.publisherSpringeren_US
dc.subjectComputer Scienceen_US
dc.subjectElliptic curve cryptographyen_US
dc.subjectLayered architectureen_US
dc.subjectSecurity threats and attacksen_US
dc.subjectThreat modeling toolsen_US
dc.titleAn Overall Perspective on Establishing End-to-End Security in Enterprise IoT (E-IoT)en_US
dc.typeBook chapteren_US
Appears in Collections:Department of Computer Science and Information Systems

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.