Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Public-Key Cryptography

Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities
Used in a cryptographic system where each sender/receiver has a public and a private key pair. The public key is public to everyone and the private key is known only to the holder of it. A sender can, for example, use the public key of the recipient to encrypt the data transmission and the receiver uses his own private key to decrypt it.
Published in Chapter:
A Survey on Attacks and Defences on LoRaWAN Gateways
Olof Magnusson (Gothenburg University, Sweden), Rikard Teodorsson (Chalmers University of Technology, Sweden), Joakim Wennerberg (Chalmers University of Technology, Sweden), and Stig Arne Knoph (Chalmers University of Technology, Sweden)
DOI: 10.4018/978-1-7998-7468-3.ch002
Abstract
LoRaWAN (long-range wide-area network) is an emerging technology for the connection of internet of things (IoT) devices to the internet and can as such be an important part of decision support systems. In this technology, IoT devices are connected to the internet through gateways by using long-range radio signals. However, because LoRaWAN is an open network, anyone has the ability to connect an end device or set up a gateway. Thus, it is important that gateways are designed in such a way that their ability to be used maliciously is limited. This chapter covers relevant attacks against gateways and potential countermeasures against them. A number of different attacks were found in literature, including radio jamming, eavesdropping, replay attacks, and attacks against the implementation of what is called beacons in LoRaWAN. Countermeasures against these attacks are discussed, and a suggestion to improve the security of LoRaWAN is also included.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
A Blockchain-Based Robotic Process Automation Mechanism in Educational Setting
Also known as asymmetric cryptography, it is a method of encrypting data with two pairs of keys, namely, public key which is available for anyone to use, and the private key known only to the owner.
Full Text Chapter Download: US $37.50 Add to Cart
User Authentication Into Electronic Health Record Based on Reliable Lightweight Algorithms
A technique used to encrypt/sign data based on a pair of public and private keys also called asymmetric cryptography.
Full Text Chapter Download: US $37.50 Add to Cart
Emerging Online E-Payment and Issues of Adoption
An asymmetric encryption technology designed to secure communication between individual entities. The sender encrypts the message using public-key of the intended receiver, and the receiver then decrypts the message using its secret key.
Full Text Chapter Download: US $37.50 Add to Cart
Automated Detection of SQL Injection Attack on Blockchain-Based Database
In this the sender and receiver uses the different key for encryption and decryption.
Full Text Chapter Download: US $37.50 Add to Cart
Review of the Blockchain Technology and Consensus Algorithms for IoT-Based Banking
A combination of keys known as a public key and a private key is associated with an entity that needs to authenticate or sign or encrypt data using public-key cryptography.
Full Text Chapter Download: US $37.50 Add to Cart
The Detection of SQL Injection on Blockchain-Based Database
In this, the sender and receiver use a different key for encryption and decryption.
Full Text Chapter Download: US $37.50 Add to Cart
Blockchain Technology and Its Applications
A cryptographic technique that uses two asymmetric keys: a public key and a private key.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR