The use of communication networks and the Internet has rocketed in the last years. From the traditional, wired settings to the wireless ones, connectivity is becoming almost ubiquitous in modern societies. Security concerns are critical, such as data forgery or tampering. In order to address these needs, security protocols have been proposed for each setting over the years. This chapter introduces the essential aspects of several representative protocols concerning authentication, remote connection, secure data exchange, and wireless protection for networks and Internet. Remarkably, basic notions on well-known protocols such as Kerberos are presented without entering into low-level details.
Acknowledgements
This work was supported by the MINECO grant TIN2013-46469-R (SPINY: Security and Privacy in the Internet of You), by the CAM grant S2013/ICE-3095 (CIBERDINE: Cybersecurity, Data, and Risks), which is co-funded by European Funds (FEDER), and by the MINECO grant TIN2016-79095-C2-2-R (SMOG-DEV—Security mechanisms for fog computing: advanced security for devices). Authors would like to thank the anonymous reviewers for their useful comments.