Protect The Business

Forums Security Discussions (Security) Protect The Business

  • This topic is empty.
Viewing 0 reply threads
  • Author
    Posts
    • #60894
      Telegram SmartBoT
      Moderator
      • Topic 5959
      • Replies 0
      • posts 5959
        @tgsmartbot

        #Discussion(Security) [ via IoTGroup ]


        As a result many IoT devices are inadequately protected from hacking which threatens the security of the IoT ecosystem and other networks to which it connects. First many IoT devices have limited processing power and memory yet robust cryptography involves substantial computational power and needs memory to store temporary or permanent encryption keys. IoT devices with unique identifiers can communicate securely with cloud-based servers that carry out data analysis and decision-making within IoT ecosystems. Digital signatures can also protect against denial-of-service (DoS) attacks in which malicious actors prevent devices from working properly by creating a fake server to intercept signals sent by the device or by overloading the server using fake devices to issue fake requests. Since IoT networks contain many devices they are vulnerable to DoS attacks. These post-quantum cryptography (PQC) strategies may also have valuable properties for enabling IoT security. In the quantum computing era it’s a challenge to handle encryption keys and digital signatures that are long enough to offer good security on devices with limited memory power and communications resources. Digital signatures are vital for authentication between devices and servers. A comparison with ECDSA a standard approach used today reveals the issue: To transmit a signature with 128 bits of security ECDSA must send a public key of 256 bits and a signature of around 576 bits. The most compact PQC digital-signature strategy remaining in the NIST analysis uses an 896-byte public key and a 690-byte signature. In other words the PQC implementation of a digital signature needs about 15 times more bandwidth than ECDSA as well as more computation and more memory to store cryptographic keys. If not IoT devices will have to rely on other ways to authenticate with servers such as greater use of key-encapsulation mechanisms and pre-shared keys. IoT security practitioners need to be aware of standardization


        Read More..
        AutoTextExtraction by Working BoT using SmartNews 1.03976957683 Build 04 April 2020

    Viewing 0 reply threads
    • You must be logged in to reply to this topic.