ABSTRACT

Industries, factories, hospitals, and homes are using Internet of Things (IoT) to monitor, analyse, and control the physical objects over the internet. Simple sensors to advanced machines connected to cloud need network security even if there is no secure data or privacy issue. But many manufacturers are unfamiliar with network security issues with their IoT-enabled products by which they are making avoidable errors that can even harm the customers or users. Attacks in the network will be performed by network attackers, where they will access the data or modify the data or destroy the data. Cryptography is basically a study of encryption, where the data will be secured during transmission and promises features such as confidentiality, authentication, integrity, and non-repudiation. This chapter focuses on the implementation of data transmission in secured IoT products, which includes provisioning process, device authentication process, encryption process (using symmetric and asymmetric keys), signature generation, and the Public Key Infrastructure (PKI) assists with asymmetric keys. In the provisioning process, certificate (with public key) and private key are deployed into the IoT product. In the process of device authentication, it is possible to check the identity of IoT product. Once the identity of IoT product is known, ephemeral secret key can deploy into the IoT product, and secure transmission of data can be accomplished using encryption process, which ensures the data's confidentiality. Signature generation incorporates the hashing and encryption process, which ensures data integrity and authenticity. This chapter also discusses the main challenges of cryptography and future directions of cryptography in integrating secured IoT products.