The Topic view for WPID= simulated rendering in new page.

Visual layout may differ depending on browser and as rendered by Older view in Website

Protect The Business

ItemDate=2021-07-14 05:44:05 Status=publish

TopicTaglist=['H11', 'G15']

#Discussion(Security) [ via IoTGroup ]

As a result many IoT devices are inadequately protected from hacking which threatens the security of the IoT ecosystem and other networks to which it connects. First many IoT devices have limited processing power and memory yet robust cryptography involves substantial computational power and needs memory to store temporary or permanent encryption keys. IoT devices with unique identifiers can communicate securely with cloud-based servers that carry out data analysis and decision-making within IoT ecosystems. Digital signatures can also protect against denial-of-service (DoS) attacks in which malicious actors prevent devices from working properly by creating a fake server to intercept signals sent by the device or by overloading the server using fake devices to issue fake requests. Since IoT networks contain many devices they are vulnerable to DoS attacks. These post-quantum cryptography (PQC) strategies may also have valuable properties for enabling IoT security. In the quantum computing era it's a challenge to handle encryption keys and digital signatures that are long enough to offer good security on devices with limited memory power and communications resources. Digital signatures are vital for authentication between devices and servers. A comparison with ECDSA a standard approach used today reveals the issue: To transmit a signature with 128 bits of security ECDSA must send a public key of 256 bits and a signature of around 576 bits. The most compact PQC digital-signature strategy remaining in the NIST analysis uses an 896-byte public key and a 690-byte signature. In other words the PQC implementation of a digital signature needs about 15 times more bandwidth than ECDSA as well as more computation and more memory to store cryptographic keys. If not IoT devices will have to rely on other ways to authenticate with servers such as greater use of key-encapsulation mechanisms and pre-shared keys. IoT security practitioners need to be aware of standardization

Read More..
AutoTextExtraction by Working BoT using SmartNews 1.03976957683 Build 04 April 2020

Footer info Your browser may cache and not show current data. On windows use CNTRL+F5 key and on Mac Shift+Refresh(browser). See more details. You may need to rotate small screen phones to landscape mode for using some menu or some views.You may contact us here if needed.