Explore chapters and articles related to this topic
A Quick Perspective on the Current State of IoT Security
Published in Mahmoud Elkhodr, Qusay F. Hassan, Seyed Shahrestani, Networks of the Future, 2017
Musa G. Samaila, João B. F. Sequeiros, Acácio F. P. P. Correia, Mário M. Freire, Pedro R. M. Inácio
TLS is the successor of Secure Sockets Layer (SSL), a cryptographic protocol for providing secure Internet connection between a client and a server using TCP transport. The key difference between the two is that TLS supports newer cipher suites and provides message authentication. TLS is used to provide end-to-end secure communication for applications that require TCP as the underlying transport protocol, such as MQTT. TLS employs a handshake mechanism to negotiate different parameters to establish a secure connection between the client and the server. The protocol is made up of two layers: a record protocol for providing a secure connection and a handshake protocol for ensuring authentication between devices and negotiating the type of encryption algorithms to be used and cryptographic keys before data exchange.
Digital Signature Schemes
Published in Jonathan Katz, Yehuda Lindell, Introduction to Modern Cryptography, 2020
The TLS protocol allows a client (e.g., a web browser) and a server (e.g., a website) to agree on a set of shared keys and then use those keys to encrypt and authenticate their subsequent communication. It consists of two parts: a handshake protocol that performs (authenticated) key exchange to establish the shared keys, and a record-layer protocol that uses those shared keys to encrypt/authenticate the parties’ communication. Although TLS allows for clients to authenticate to servers, it is primarily used only for authentication of servers to clients because typically only servers have certificates. (After a TLS session is established, client-to-server authentication—if desired—can be done at the application layer by, e.g., having the client send a password.)
Digital Transformation and the Cybersecurity of Infrastructure Systems in the Oil And Gas Sector
Published in Edward Ochieng, Tarila Zuofa, Sulafa Badi, Routledge Handbook of Planning and Management of Global Strategic Infrastructure Projects, 2020
Technology is the first line of defence to cyber-proof critical oil and gas infrastructure systems. Oil and gas organisations suffer from information interruptions by hackers, which frequently occur due to vulnerabilities in the company communication, port, and service channels (Khurana, 2011). As noted earlier, there are several types of attacks on a network, for example, DoS and MITM attacks. To increase the cybersecurity of systems, the interruption of systems can be avoided by using Transport Layer Security (TLS). TLS is a cryptographic protocol that prevents eavesdropping and tampering and enables client-server applications to communicate safely across a network (Oh et al., 2017). Companies’ websites ensure sensitive communication that runs over the secure HTTPS channel uses the TLS protocol. The HTTPS protocol is designed to increase privacy on the Internet when communicating with websites and sending sensitive data. This protocol has made MITM attacks increasingly difficult as the data is transmitted in an encrypted manner. To implement this measure, the owner must purchase an Secure Socket Layer (SSL) certificate, which acts as an online identification card and encrypts any data that passes through the HTTPS protocol. Now, when a user requests data from the server, it examines the SSL certificate, which provides authorised confirmation of the website's identity. Subsequently, an encryption method is decided and used to encrypt and decrypt the data (Aloul, 2010). If an MITM attack occurs, this data is encrypted and unreadable. However, it should be noted that accessing an HTTPS website does not mean that the system is secured from other types of attacks.
Plug and Charge Solutions with Vehicle-to-Grid Communication
Published in Electric Power Components and Systems, 2023
TLS is available on the transport layer of the OSI layer model, which is based on a server-client cryptographic protocol to secure communication between two entities. TLS is used to exchange the necessary certificates for the authentication process between the EV and EVSE to authenticate the charging station to the e-vehicle. For the authentication of the vehicle toward the charging station, conversely, the contract certificates are used on the application level.
Cloud manufacturing architecture for part quality assessment
Published in Cogent Engineering, 2020
Alessandra Caggiano, Tiziana Segreto, Roberto Teti
Afterwards, the obtained pre-processed point cloud is transmitted by Hypertext Transfer Protocol Secure (HTTPS) data communication protocol to the cloud layer for advanced processing aimed at the construction of the STL file. HTTPS encrypted using Transport Layer Security (TLS) allows for secure communication through authentication, protection of the privacy and integrity of the exchanged data in transit.