Chapter 6 Hardware-Based Authentication Techniques for Secure Data Transmission in IoT Edge Computing
-
Sangeetha Rajaram
, Satyanarayana Vollala , N. Ramasubramanian and J. Kokila
Abstract
Cryptographic authentication is needed everywhere in the IoT ecosystem, like authenticated sender, receiver, message, document, client, server, website, web server, data repository, authenticated meeting, group, community, router, switch, and so on. In this chapter, we are going to introduce the important hardware-based authentication techniques for digital signatures, digital certificate, and key exchange protocols. The hardware-based signatures adopt the existing cryptographic mechanisms of signing things that ensure authentication, integrity, and non-repudiation. That is, the device ensures the sender, who cannot deny being the sender, and the device’s message is unaltered. The following steps are to be followed for the working of hardware-based signatures: key generation, signing, and signature verification based on the SoC platform. A digital certificate is issued by a Certificate Authority (trusted third party) that is used to verify the identity of the device automatically in an IoT ecosystem. Digital certificates usually contain the identity of the device holder, the number that uniquely identifies the certificate, the expiration date, the holder’s public key copy, and the digital signature of the issuing authority. Some of the digital certificates are SSL certificates, credit/ debit card certificates, and email certificates. Key exchange protocols exchange long-term and short-term session keys securely. They use long-term keys to generate short-term keys in hardware modules. Short-term key is used as a session key. On reveal of a session key, past or future keys are not revealed for security reasons. Some of the key exchange 142protocols are IKEv1, SDES, RTP, and RTCP. Deploying such protocols in hardware platforms is still challenging and the future scope of this chapter.
Abstract
Cryptographic authentication is needed everywhere in the IoT ecosystem, like authenticated sender, receiver, message, document, client, server, website, web server, data repository, authenticated meeting, group, community, router, switch, and so on. In this chapter, we are going to introduce the important hardware-based authentication techniques for digital signatures, digital certificate, and key exchange protocols. The hardware-based signatures adopt the existing cryptographic mechanisms of signing things that ensure authentication, integrity, and non-repudiation. That is, the device ensures the sender, who cannot deny being the sender, and the device’s message is unaltered. The following steps are to be followed for the working of hardware-based signatures: key generation, signing, and signature verification based on the SoC platform. A digital certificate is issued by a Certificate Authority (trusted third party) that is used to verify the identity of the device automatically in an IoT ecosystem. Digital certificates usually contain the identity of the device holder, the number that uniquely identifies the certificate, the expiration date, the holder’s public key copy, and the digital signature of the issuing authority. Some of the digital certificates are SSL certificates, credit/ debit card certificates, and email certificates. Key exchange protocols exchange long-term and short-term session keys securely. They use long-term keys to generate short-term keys in hardware modules. Short-term key is used as a session key. On reveal of a session key, past or future keys are not revealed for security reasons. Some of the key exchange 142protocols are IKEv1, SDES, RTP, and RTCP. Deploying such protocols in hardware platforms is still challenging and the future scope of this chapter.
Chapters in this book
- Frontmatter I
- Contents V
- Chapter 1 Emerging Cyber Threats: Challenges, Impacts, and Proactive Defenses in the Digital Age 1
- Chapter 2 Silent Guardians: Proactive Approaches to Modern Cyber Threats 31
- Chapter 3 Data Science for Threat Detection and Analysis 59
- Chapter 4 An Integrated Approach: Merging Cybersecurity, AI, and Threat Detection 87
- Chapter 5 Cybersecurity Analytics: A Review of Challenges and the Role of Machine Learning and Deep Learning in Threat Detection 103
- Chapter 6 Hardware-Based Authentication Techniques for Secure Data Transmission in IoT Edge Computing 141
- Chapter 7 Securing the IoT Networks Using a Deep Learning Paradigm for Intrusion Detection 161
- Chapter 8 Hybrid Malware Detection and Classification Using Explainable Deep Neural Network 177
- Chapter 9 Light POW for Smart Grid Communication 201
- Chapter 10 Zero Trust Architecture – A Beginner’s Guide 227
- Chapter 11 Post-quantum Cryptography for Enhanced Authentication in Mobile Data Communication: Resilience Against Quantum Attacks 265
- Chapter 12 Two-Factor Authentication (2FA) and Multi-factor Authentication (MFA) Solutions for Secure Mobile Data Communication 287
- Chapter 13 Artificial Intelligence and Machine Learning in Cybersecurity 313
- Chapter 14 Enhancing IoT Security with Zero Trust Networking: Protecting Wireless Sensors, Edge Devices, and Cloud Environments 343
- Chapter 15 Biometric Authentication Methods for Mobile Devices: Exploring Fingerprint, Face Recognition, and Iris Scanning 365
- Chapter 16 Robust Dynamic Voice-Based Key Generation Using Novel Fuzzy Extraction, Averaged Thresholding, and Hamming Enhancement Techniques 385
- Chapter 17 Enhancing Cybersecurity with Artificial Intelligence and Machine Learning Techniques 413
- Chapter 18 Firewall and IDS in Cybersecurity 439
- Index
Chapters in this book
- Frontmatter I
- Contents V
- Chapter 1 Emerging Cyber Threats: Challenges, Impacts, and Proactive Defenses in the Digital Age 1
- Chapter 2 Silent Guardians: Proactive Approaches to Modern Cyber Threats 31
- Chapter 3 Data Science for Threat Detection and Analysis 59
- Chapter 4 An Integrated Approach: Merging Cybersecurity, AI, and Threat Detection 87
- Chapter 5 Cybersecurity Analytics: A Review of Challenges and the Role of Machine Learning and Deep Learning in Threat Detection 103
- Chapter 6 Hardware-Based Authentication Techniques for Secure Data Transmission in IoT Edge Computing 141
- Chapter 7 Securing the IoT Networks Using a Deep Learning Paradigm for Intrusion Detection 161
- Chapter 8 Hybrid Malware Detection and Classification Using Explainable Deep Neural Network 177
- Chapter 9 Light POW for Smart Grid Communication 201
- Chapter 10 Zero Trust Architecture – A Beginner’s Guide 227
- Chapter 11 Post-quantum Cryptography for Enhanced Authentication in Mobile Data Communication: Resilience Against Quantum Attacks 265
- Chapter 12 Two-Factor Authentication (2FA) and Multi-factor Authentication (MFA) Solutions for Secure Mobile Data Communication 287
- Chapter 13 Artificial Intelligence and Machine Learning in Cybersecurity 313
- Chapter 14 Enhancing IoT Security with Zero Trust Networking: Protecting Wireless Sensors, Edge Devices, and Cloud Environments 343
- Chapter 15 Biometric Authentication Methods for Mobile Devices: Exploring Fingerprint, Face Recognition, and Iris Scanning 365
- Chapter 16 Robust Dynamic Voice-Based Key Generation Using Novel Fuzzy Extraction, Averaged Thresholding, and Hamming Enhancement Techniques 385
- Chapter 17 Enhancing Cybersecurity with Artificial Intelligence and Machine Learning Techniques 413
- Chapter 18 Firewall and IDS in Cybersecurity 439
- Index