Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …
factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the …
A systematic security assessment and review of internet of things in the context of authentication
Abstract The Internet of Things is emerging globally as an intriguing trend expected to
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …
connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation …
Review on security of internet of things authentication mechanism
Internet of things (IoT) is considered as a collection of heterogeneous devices, such as
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …
sensors, Radio-frequency identification (RFID) and actuators, which form a huge network …
On the design of biometric-based user authentication protocol in smart city environment
Among the security services, like authentication, access control, key management and
intrusion detection, user authentication is very much needed for a smart city environment …
intrusion detection, user authentication is very much needed for a smart city environment …
Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters
In this article, we propose an efficient Bloom filter and fuzzy extractor based user
authentication technique, which is significant for an Internet of Things (IoT)-enabled multi …
authentication technique, which is significant for an Internet of Things (IoT)-enabled multi …
A secure, lightweight, and anonymous user authentication protocol for IoT environments
The Internet of Things (IoT) is being applied to various environments such as telecare
systems, smart homes, and intelligent transportation systems. The information generated …
systems, smart homes, and intelligent transportation systems. The information generated …
Improved secure and efficient Chebyshev chaotic map-based user authentication scheme
A Chebyshev chaotic map is a method for implementing efficient authentication. Recently,
Chatterjee et al. proposed an authentication scheme for multi-server/multi-client …
Chatterjee et al. proposed an authentication scheme for multi-server/multi-client …
Review of Security and Privacy-Based IoT Smart Home Access Control Devices
S Uppuluri, G Lakshmeeswari - Wireless Personal Communications, 2024 - Springer
Abstract The Internet of Things (IoT) represents a network framework comprising identifiable
entities that interact through the Internet. One of its applications is the smart home, where …
entities that interact through the Internet. One of its applications is the smart home, where …
Lightweight user authentication scheme for roaming service in GLOMONET with privacy preserving
With the development of information technology and the Internet, users can conveniently use
roaming services without time and space restrictions. This roaming service is initiated by …
roaming services without time and space restrictions. This roaming service is initiated by …
[PDF][PDF] Cogent and energy efficient authentication protocol for wsn in iot
Given the accelerating development of Internet of things (IoT), a secure and robust
authentication mechanism is urgently required as a critical architectural component. The IoT …
authentication mechanism is urgently required as a critical architectural component. The IoT …