Reference Hub3
Internet of Things (IoT) and PKI-Based Security Architecture

Internet of Things (IoT) and PKI-Based Security Architecture

Sandeep Mathur, Ankita Arora
ISBN13: 9781799828037|ISBN10: 1799828034|ISBN13 Softcover: 9781799828044|EISBN13: 9781799828051
DOI: 10.4018/978-1-7998-2803-7.ch002
Cite Chapter Cite Chapter

MLA

Mathur, Sandeep, and Ankita Arora. "Internet of Things (IoT) and PKI-Based Security Architecture." Industrial Internet of Things and Cyber-Physical Systems: Transforming the Conventional to Digital, edited by Pardeep Kumar, et al., IGI Global, 2020, pp. 25-46. https://doi.org/10.4018/978-1-7998-2803-7.ch002

APA

Mathur, S. & Arora, A. (2020). Internet of Things (IoT) and PKI-Based Security Architecture. In P. Kumar, V. Ponnusamy, & V. Jain (Eds.), Industrial Internet of Things and Cyber-Physical Systems: Transforming the Conventional to Digital (pp. 25-46). IGI Global. https://doi.org/10.4018/978-1-7998-2803-7.ch002

Chicago

Mathur, Sandeep, and Ankita Arora. "Internet of Things (IoT) and PKI-Based Security Architecture." In Industrial Internet of Things and Cyber-Physical Systems: Transforming the Conventional to Digital, edited by Pardeep Kumar, Vasaki Ponnusamy, and Vishal Jain, 25-46. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2803-7.ch002

Export Reference

Mendeley
Favorite

Abstract

The internet of things (IoT) is described as the arrangement of physical articles—contraptions, automobiles, structures, and various things—fixed with equipment, programming, devices, and framework accessibility that engages these things to accumulate and exchange data. Practically paying little mind to industry, IoT is anticipated to be the absolute most significant factor affecting basic business rationale in the coming decades. PKI is the best alternative for arrangement suppliers to secure information and associated gadgets. When effectively executed, PKI can fabricate and bolster security and trust in IoT biological systems. PKI's job in IoT gives solid personality validation and makes the establishment of trust that frameworks, gadgets, applications, and clients need to securely connect and trade delicate information. PKI and the brought forth trust networks spread the basic security necessities IoT tasks need, giving the encryption, confirmation, and information respectability that make the establishment of trust. This chapter explores PKI-based security architecture.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.