Cryptography for Security in IoT

Jorge Martinez Carracedo, Michael Milliken, Pushpinder Chouhan, Bryan Scotney, Zhiwei Lin, Ali Sajjad, Mark Shackleton

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

22 Citations (Scopus)

Abstract

The Internet of Thing (IoT) has rapidly emerged as the manifesto of the Linked Society, where everything that benefits from a connection is connected. The IoT consists of multiple ecosystems, with different requirements and capabilities. There are few in the community who can escape IoT impact. As IoT environments are capturing the market, security in IoT has reached the top on the security agenda. This paper presents a comprehensive survey of the Cryptography research relating to security in IoT. The security enhancements derived from cryptography research to answer the security challenges introduced by the IoT environments are discussed. By categorising the cryptography research, a set of conclusion and proposals for future research directions are presented.
Original languageEnglish
Title of host publication2018 Fifth International Conference on Internet of Things: Systems, Management and Security
Subtitle of host publicationCryptography for Security in IoT,
Place of PublicationValencia, Spain
PublisherIEEE Xplore
Pages23-30
Number of pages8
ISBN (Electronic) 978-1-5386-9585-2
ISBN (Print)978-1-5386-9586-9
DOIs
Publication statusPublished (in print/issue) - 2018
Event2018 Fifth International Conference on Internet of Things: Systems, Management and Security - Valencia, Valencia, Spain
Duration: 15 Oct 201818 Oct 2018
https://ieeexplore.ieee.org/xpl/conhome/8537438/proceeding

Conference

Conference2018 Fifth International Conference on Internet of Things: Systems, Management and Security
Country/TerritorySpain
CityValencia
Period15/10/1818/10/18
Internet address

Keywords

  • IoT
  • Security
  • Cryptography

Fingerprint

Dive into the research topics of 'Cryptography for Security in IoT'. Together they form a unique fingerprint.

Cite this