Abstract
In this chapter, the authors examine the theoretical context for the security of wireless communication between ubiquitous computing devices and present an implementation that addresses this need. The number of resource-limited wireless devices utilized in many areas of the IT industry is growing rapidly. Some of the applications of these devices pose real security threats that can be addressed using authentication and cryptography. Many of the available authentication and encryption software solutions are predicated on the availability of ample processing power and memory. These demands cannot be met by most ubiquitous computing devices; thus, there is a need to apply lightweight cryptography primitives and lightweight authentication protocols that meet these demands in any application of security to devices with limited resources. The analysis of the lightweight solutions is divided into lightweight authentication protocols and lightweight encryption algorithms. The authors present a prototype running on the nRF9E5 microcontroller that provides necessary authentication and encryption on resource-limited devices.
Original language | English |
---|---|
Title of host publication | Security and Privacy Management, Techniques, and Protocols |
Publisher | IGI Global |
Pages | 1-46 |
Number of pages | 46 |
ISBN (Electronic) | 9781522555841 |
ISBN (Print) | 1522555838, 9781522555834 |
DOIs | |
Publication status | Published - 6 Apr 2018 |