[HTML][HTML] MFF-IoT: A Multi-Granularity Formal Framework of User Authentication for IoT

Y Fei, J Yin, L Yan - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) generates vast amounts of data from numerous applications.
However, since wireless channels are the primary means of communication, IoT networks …

Dynamically Configurable Architecture for User Identification and Authentication for Internet of Things Platform

R Khan - … International Conference on Electrical, Computer and …, 2019 - ieeexplore.ieee.org
With the significant improvement of the deployment of Internet of Things (IoT) into the smart
grid infrastructure and the increasing number of connected devices as well as users through …

Formal analysis of 5G EAP-TLS authentication protocol using proverif

J Zhang, L Yang, W Cao, Q Wang - IEEE access, 2020 - ieeexplore.ieee.org
As a critical component of the security architecture of 5G network, the authentication protocol
plays a role of the first safeguard in ensuring the communication security, such as the …

Multi-factor based user authentication scheme for lightweight IoT devices

J Gowthami, N Shanthi - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
Authentication of legitimate user plays a prominent role in security of the Internet of Things
(IoT) applications like smart home, smart cities, wearable devices etc. The services offered …

A context-driven modelling framework for dynamic authentication decisions

A Bumiller, O Barais, S Challita… - 2022 48th Euromicro …, 2022 - ieeexplore.ieee.org
Nowadays, many mechanisms exist to perform authentication, such as text passwords and
biometrics. However, reasoning about their relevance (eg, the appropriateness for security …

On-phone CNN model-based implicit authentication to secure IoT wearables

SV Dibbo, W Cheung, S Vhaduri - … Conference on Safety and Security with …, 2022 - Springer
The connectivity of smart technologies, such as smartphones and smart wearables, is ever-
increasing with the emergence of the internet of things (IoT). This technological …

Channel-prediction-based one-class mobile IoT device authentication

HM Wang, QY Fu - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Physical layer authentication (PLA) is a promising complement for the cryptographic-based
authentication scheme, especially for Internet of Things (IoT) scenarios with massive …

Formal verification of 5G-EAP-TLS authentication protocol

J Zhang, Q Wang, L Yang… - 2019 IEEE fourth …, 2019 - ieeexplore.ieee.org
In mobile communication networks, the security of users' data depends on the guarantees
provided by the authentication protocols. For the next generation of mobile network (ie, 5G …

A Delicate Authentication Mechanism for IoT Devices with Lower Overhead Issues

R Raja, R Saraswathi - … Technologies: Proceedings of Fifth ICCNCT 2022, 2022 - Springer
IoT sensor/edge nodes are vulnerable to many well-known threats. Maintaining the absolute
reliability of any IoT LAN requires validating edge nodes before entering a network, mainly …

A behavior profiling model for user authentication in IoT networks based on app usage patterns

Y Ashibani, QH Mahmoud - … 2018-44th annual conference of the …, 2018 - ieeexplore.ieee.org
Access to Internet of Things (IoT) devices is, in most cases, achieved remotely through end-
user devices such as smartphones. However, these devices are susceptible to theft or loss …