Loading...
Please wait, while we are loading the content...
Similar Documents
Trust and Trust Models for the IoT
| Content Provider | Scilit |
|---|---|
| Copyright Year | 2016 |
| Description | Trust and security are based on tokens or credentials, provided by a trust management infrastructure, which are embedded in and potentially shared between devices (note that this chapter will use the terms peers, devices, and (end) entities to describe IoT nodes). The integrity and robustness of these tokens (which can, for example, be symmetric keys or digital certificates) are the cornerstone of trust and security. They are useful in deflecting external attacks initiated by entitiesthat are not in possession of credentials, but fail to deflect internal attacks, where credentials or nodes that own credentials have been compromised. Book Name: Security and Privacy in Internet of Things (IoTs) |
| Related Links | https://api.taylorfrancis.com/content/chapters/edit/download?identifierName=doi&identifierValue=10.1201/b19516-18&type=chapterpdf |
| Ending Page | 288 |
| Page Count | 32 |
| Starting Page | 257 |
| DOI | 10.1201/b19516-18 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2016-04-05 |
| Access Restriction | Open |
| Subject Keyword | Book Name: Security and Privacy in Internet of Things (iots) Models Tokens Deflect Attacks |
| Content Type | Text |
| Resource Type | Chapter |