Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction

K Istiaque Ahmed, M Tahir, M Hadi Habaebi, S Lun Lau… - Sensors, 2021 - mdpi.com
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …

A systematic security assessment and review of internet of things in the context of authentication

M Saqib, AH Moon - Computers & Security, 2023 - Elsevier
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …

Review on security of internet of things authentication mechanism

T Nandy, MYIB Idris, RM Noor, LM Kiah, LS Lun… - IEEE …, 2019 - ieeexplore.ieee.org
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …

On the design of biometric-based user authentication protocol in smart city environment

B Bera, AK Das, W Balzano, CM Medaglia - Pattern Recognition Letters, 2020 - Elsevier
Among the security services, like authentication, access control, key management and
intrusion detection, user authentication is very much needed for a smart city environment …

Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters

AK Maurya, AK Das, SS Jamal, D Giri - Journal of Systems Architecture, 2021 - Elsevier
In this article, we propose an efficient Bloom filter and fuzzy extractor based user
authentication technique, which is significant for an Internet of Things (IoT)-enabled multi …

A secure, lightweight, and anonymous user authentication protocol for IoT environments

S Son, Y Park, Y Park - Sustainability, 2021 - mdpi.com
The Internet of Things (IoT) is being applied to various environments such as telecare
systems, smart homes, and intelligent transportation systems. The information generated …

Improved secure and efficient Chebyshev chaotic map-based user authentication scheme

J Ryu, D Kang, D Won - IEEE Access, 2022 - ieeexplore.ieee.org
A Chebyshev chaotic map is a method for implementing efficient authentication. Recently,
Chatterjee et al. proposed an authentication scheme for multi-server/multi-client …

Review of Security and Privacy-Based IoT Smart Home Access Control Devices

S Uppuluri, G Lakshmeeswari - Wireless Personal Communications, 2024 - Springer
Abstract The Internet of Things (IoT) represents a network framework comprising identifiable
entities that interact through the Internet. One of its applications is the smart home, where …

Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving

D Kang, H Lee, Y Lee, D Won - Plos one, 2021 - journals.plos.org
With the development of information technology and the Internet, users can conveniently use
roaming services without time and space restrictions. This roaming service is initiated by …

[PDF][PDF] Cogent and energy efficient authentication protocol for wsn in iot

TM Butt, R Riaz, C Chakraborty, SS Rizvi… - Comput. Mater …, 2021 - researchgate.net
Given the accelerating development of Internet of things (IoT), a secure and robust
authentication mechanism is urgently required as a critical architectural component. The IoT …