2020
DOI: 10.4018/978-1-7998-2803-7.ch002
|View full text |Cite
|
Sign up to set email alerts
|

Internet of Things (IoT) and PKI-Based Security Architecture

Abstract: The internet of things (IoT) is described as the arrangement of physical articles—contraptions, automobiles, structures, and various things—fixed with equipment, programming, devices, and framework accessibility that engages these things to accumulate and exchange data. Practically paying little mind to industry, IoT is anticipated to be the absolute most significant factor affecting basic business rationale in the coming decades. PKI is the best alternative for arrangement suppliers to secure information and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
0
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 14 publications
0
0
0
Order By: Relevance
“…This process of signature and verification must take place in all environments and systems where this concept is applied. However, as stated in Section 1, PKI paradigms are no longer enough in IIoT environments [6]. New paradigms such as Blockchain have emerged, providing further security benefits to IIoT networks [47,48].…”
Section: Blockchain Applicationmentioning
confidence: 99%
See 1 more Smart Citation
“…This process of signature and verification must take place in all environments and systems where this concept is applied. However, as stated in Section 1, PKI paradigms are no longer enough in IIoT environments [6]. New paradigms such as Blockchain have emerged, providing further security benefits to IIoT networks [47,48].…”
Section: Blockchain Applicationmentioning
confidence: 99%
“…Although one of the main aspects is to protect communications, as these provide the largest attackable area of the system [5], this is not enough. In this type of system, paradigms such as traditional client-server-based protocols and implement access control through a public key infrastructure (PKI) are no longer enough [6].…”
Section: Introductionmentioning
confidence: 99%