Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Asymmetric cryptography

Harnessing the Internet of Everything (IoE) for Accelerated Innovation Opportunities
Asymmetric cryptography or public-key cryptography is based on key pairs. It consists of a public key for encryption, known to everyone, and a private key for decryption, known only to the owner. Public-key algorithms can be used for encryption and authentication. Common algorithms are ECC (elliptic curve cryptography) and RSA (Rivest, Shamir, and Adleman cryptosystem).
Published in Chapter:
Securing Over-the-Air Code Updates in Wireless Sensor Networks
Christian Wittke (Leibniz-Institut für innovative Mikroelektronik, Germany), Kai Lehniger (Leibniz-Institut für innovative Mikroelektronik, Germany), Stefan Weidling (Leibniz-Institut für innovative Mikroelektronik, Germany), and Mario Schoelzel (Leibniz-Institut für innovative Mikroelektronik, Germany)
DOI: 10.4018/978-1-5225-7332-6.ch013
Abstract
With the growing number of wireless devices in the internet of things (IoT), maintenance and management of these devices has become a key issue. In particular, the ability to wirelessly update devices is a must in order to fix security issues and software bugs, or to extend firmware functionality. Code update mechanisms in wireless sensor networks (WSNs), a subset of IoT networks, must handle limited resources and strict constraints. Also, over-the-air (OTA) code updates in the context of an IoT ecosystem may open new security vulnerabilities. An IoT security framework should therefore be extended with additional mechanisms to secure the OTA code update functionality. The chapter presents an overview of various OTA code update techniques for WSNs and their security flaws along with some existing attacks and possible countermeasures. It is discussed which attacks can be used more easily with the code update functionality. Countermeasures are compared as to whether they secure the weakened security objectives, giving a guideline to choose the right combination of countermeasures.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Blockchain as an Enabler for Zero-Trust Architectures
Another term for public key cryptography that uses public key and private key associations through a mathematical proof to underpin PKI.
Full Text Chapter Download: US $37.50 Add to Cart
Sustainability of Public Key Cryptosystem in Quantum Computing Paradigm
Use two different but related keys for encryption and decryption.
Full Text Chapter Download: US $37.50 Add to Cart
Security-Based Knowledge Management
A technique using different keys to encrypt and decrypt messages. Usually, a public key is used to encrypt a message, and a private key is used to decrypt it.
Full Text Chapter Download: US $37.50 Add to Cart
A Survey of KYC/AML for Cryptocurrencies Transactions
A crypthography system whereby the user owns a key pair. The private key must remain private to sign and decrypt. The public key can be made public to be able to identify the user, most often based on a hash of the public key, and encrypt information for the owner.
Full Text Chapter Download: US $37.50 Add to Cart
A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks
In public key or asymmetric cryptography, there is a pair of public/private keys. The private key is known only to the owner, while the public key is shared with others. One of the earliest public-key cryptographic techniques, known as RSA, was developed in the 1970s.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Routing Protocols for Wireless Adhoc Networks
Requires a pair of keys at the sender and at the receiver.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR