[HTML][HTML] MFF-IoT: A Multi-Granularity Formal Framework of User Authentication for IoT
Y Fei, J Yin, L Yan - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) generates vast amounts of data from numerous applications.
However, since wireless channels are the primary means of communication, IoT networks …
However, since wireless channels are the primary means of communication, IoT networks …
Dynamically Configurable Architecture for User Identification and Authentication for Internet of Things Platform
R Khan - … International Conference on Electrical, Computer and …, 2019 - ieeexplore.ieee.org
With the significant improvement of the deployment of Internet of Things (IoT) into the smart
grid infrastructure and the increasing number of connected devices as well as users through …
grid infrastructure and the increasing number of connected devices as well as users through …
Formal analysis of 5G EAP-TLS authentication protocol using proverif
J Zhang, L Yang, W Cao, Q Wang - IEEE access, 2020 - ieeexplore.ieee.org
As a critical component of the security architecture of 5G network, the authentication protocol
plays a role of the first safeguard in ensuring the communication security, such as the …
plays a role of the first safeguard in ensuring the communication security, such as the …
Multi-factor based user authentication scheme for lightweight IoT devices
J Gowthami, N Shanthi - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
Authentication of legitimate user plays a prominent role in security of the Internet of Things
(IoT) applications like smart home, smart cities, wearable devices etc. The services offered …
(IoT) applications like smart home, smart cities, wearable devices etc. The services offered …
A context-driven modelling framework for dynamic authentication decisions
Nowadays, many mechanisms exist to perform authentication, such as text passwords and
biometrics. However, reasoning about their relevance (eg, the appropriateness for security …
biometrics. However, reasoning about their relevance (eg, the appropriateness for security …
On-phone CNN model-based implicit authentication to secure IoT wearables
SV Dibbo, W Cheung, S Vhaduri - … Conference on Safety and Security with …, 2022 - Springer
The connectivity of smart technologies, such as smartphones and smart wearables, is ever-
increasing with the emergence of the internet of things (IoT). This technological …
increasing with the emergence of the internet of things (IoT). This technological …
Channel-prediction-based one-class mobile IoT device authentication
HM Wang, QY Fu - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Physical layer authentication (PLA) is a promising complement for the cryptographic-based
authentication scheme, especially for Internet of Things (IoT) scenarios with massive …
authentication scheme, especially for Internet of Things (IoT) scenarios with massive …
Formal verification of 5G-EAP-TLS authentication protocol
J Zhang, Q Wang, L Yang… - 2019 IEEE fourth …, 2019 - ieeexplore.ieee.org
In mobile communication networks, the security of users' data depends on the guarantees
provided by the authentication protocols. For the next generation of mobile network (ie, 5G …
provided by the authentication protocols. For the next generation of mobile network (ie, 5G …
A Delicate Authentication Mechanism for IoT Devices with Lower Overhead Issues
R Raja, R Saraswathi - … Technologies: Proceedings of Fifth ICCNCT 2022, 2022 - Springer
IoT sensor/edge nodes are vulnerable to many well-known threats. Maintaining the absolute
reliability of any IoT LAN requires validating edge nodes before entering a network, mainly …
reliability of any IoT LAN requires validating edge nodes before entering a network, mainly …
A behavior profiling model for user authentication in IoT networks based on app usage patterns
Y Ashibani, QH Mahmoud - … 2018-44th annual conference of the …, 2018 - ieeexplore.ieee.org
Access to Internet of Things (IoT) devices is, in most cases, achieved remotely through end-
user devices such as smartphones. However, these devices are susceptible to theft or loss …
user devices such as smartphones. However, these devices are susceptible to theft or loss …