0

Improving Functionality, Efficiency, and Trustworthiness of Secure Communication on an Internet diversified by Mobile Devices and the Internet of Things

Erscheinungsjahr: 2023
CHF 64,90
(inkl. MwSt.)

In der Regel lieferbar innerhalb 1-3 Tagen

In den Warenkorb
Bibliografische Daten
ISBN/EAN: 9783844089523
Sprache: Englisch
Umfang: 314
Format (T/L/B): 21.0 x 14.0 cm
Auflage: 1. Auflage

Beschreibung

Secure communication is essential for many use cases that exchange data over the Internet. However, prevalently used security protocols, e.g., TLS 1.2, have been standardized many years ago. The advent of smartphones and the Internet of Things (IoT) introduced new scenarios with more diverse devices and use cases. The resulting evolved Internet motivates the question for a likewise evolved secure communication. To examine the need for improvements, we analyze the state of the art of secure communication for the different scenarios of the evolved Internet. Our analysis reveals several open challenges, especially missing advanced security and privacy features for secure communication in the IoT, the need for increased efficiency of secure communication by smartphones, and the demand for efficient secure low-latency communication in the industrial IoT. Furthermore, we identify open problems in the PKI-based trust infrastructure, and highlight the need to understand drivers and obstacles of the roll-out of new security mechanisms. To tackle these open challenges, we tailor the Tor anonymity network to resource-constrained IoT devices to protect the metadata of IoT communication and realize a resource-efficient in-network access control. Also, we enable IoT devices to use versatile secure communication stacks. Second, we increase secure communication efficiency by realizing secure low-latency communication for the industrial IoT. Moreover, we devise more efficient best practices for the secure connection setup by smartphones. Third, we provide a detailed risk analysis of cross-signing in the Web PKI, revealing that it can cause undesired certificate trust paths. Fourth, we analyze drivers and obstacles for the roll-out of adapted security protocols using TLS 1.3 as example.

Weitere Artikel aus der Reihe "Reports on Communications and Distributed Systems"

Alle Artikel anzeigen

Weitere Artikel vom Autor "Hiller, Jens"

In der Regel lieferbar innerhalb 1-3 Tagen

CHF 29,50
inkl. MwSt.

In der Regel lieferbar innerhalb 1-3 Tagen

CHF 65,00
inkl. MwSt.

In der Regel lieferbar innerhalb 1-3 Tagen

CHF 24,50
inkl. MwSt.
Alle Artikel anzeigen

Weitere Artikel aus der Kategorie "Informatik & EDV"

In der Regel lieferbar innerhalb 1-3 Tagen

CHF 29,50
inkl. MwSt.

Nicht lieferbar

CHF 16,90
inkl. MwSt.

In der Regel lieferbar innerhalb 1-3 Tagen

CHF 44,00
inkl. MwSt.

Nicht lieferbar

CHF 26,90
inkl. MwSt.

In der Regel lieferbar innerhalb 1-3 Tagen

CHF 26,90
inkl. MwSt.
Alle Artikel anzeigen