ABSTRACT

Whatever devices recently developed for the internet of things (IoT) including health care devices are developed with the aim of providing services to the customer but not with the aim of providing secure services to customer. IoT devices will be resource constrained devices so recent authentication schemes and encryption/decryption algorithms will not be suitable options for IoT devices. This conclusion presents some closing thoughts on the concepts covered in the preceding chapters of this book. The book discusses the IoT, IoT architecture, IoT security and concepts of light weight authentication. It also discusses mathematical fundamentals required for cryptography. The book highlights the concepts of single server based authentication schemes and various phases required. It examines various attacks and attack scenarios that need to be considered during the designing of authentication. The book focuses on a discussion about various cryptographic tools that are required for the analysis of security scheme.