Skip to main content

Cryptology and the Internet of Things

  • Chapter
  • First Online:
History of Cryptography and Cryptanalysis

Part of the book series: History of Computing ((HC))

Abstract

The ubiquity of mobile devices and the increasing penetration of “smart” home devices and autonomous vehicles are the first signs of the Internet of Things . When all of your personal devices, your appliances, your car, and your home become “smart” and connected there are a number of issues that will need to be addressed including privacy, transparency, open access, and publicity. Who collects your data, where it is stored, and how it is stored and transmitted will all be important topics going forward. Cryptology will be central to all of these questions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 44.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Scrum is an agile software development process. At each daily standup meeting each developer answers three questions: (1) What did you do since yesterday? (2) What are you going to do between now and the next standup meeting? And (3) is there anything getting in your way? This brings all the team members up to speed on the current status of the project.

  2. 2.

    Many of these security holes and proposed resolutions are suggested in https://blog.malwarebytes.com/101/2017/12/internet-things-iot-security-never/ (Retrieved 02/22/2018).

  3. 3.

    https://en.wikipedia.org/wiki/Mirai_(malware)

  4. 4.

    https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

  5. 5.

    https://en.wikipedia.org/wiki/CAN_bus

  6. 6.

    https://www.freedesktop.org/wiki/Software/dbus/ and https://dbus.freedesktop.org/doc/dbus-tutorial.html

  7. 7.

    https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

References

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Dooley, J.F. (2018). Cryptology and the Internet of Things. In: History of Cryptography and Cryptanalysis. History of Computing. Springer, Cham. https://doi.org/10.1007/978-3-319-90443-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-90443-6_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-90442-9

  • Online ISBN: 978-3-319-90443-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics