2017 1st Cyber Security in Networking Conference (CSNet) 2017
DOI: 10.1109/csnet.2017.8242006
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of authentication techniques in Internet of Things (IoT)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 69 publications
(43 citation statements)
references
References 18 publications
0
43
0
Order By: Relevance
“…Current literature shows several works [9][10][11] addressing security challenges in IoT. Among them, in this paper, we focus our attention on the authentication problem [12,13]. In [14], the main authentication models for IoT are presented.…”
Section: Related Workmentioning
confidence: 99%
“…Current literature shows several works [9][10][11] addressing security challenges in IoT. Among them, in this paper, we focus our attention on the authentication problem [12,13]. In [14], the main authentication models for IoT are presented.…”
Section: Related Workmentioning
confidence: 99%
“…IoT signifies a ground-breaking evolution of the conceptualization of internet from a communication means from man-to-man into all-to-all framework [5]. Subsequently this growth and usage would produce colossal security hazards and challenges.…”
Section: Fig 1 Iot Regarded As Network Of Network [Adapted From 10]mentioning
confidence: 99%
“…Accordingly, IoT is a desirable and guaranteeing platform for the hackers to implement their unethical activities and progress their range of network expansion [7,8]. Based on the application field, the necessities for security comprises of all the security needs such as authentication, confidentiality, availability, Integrity and so on [5].…”
Section: Fig 1 Iot Regarded As Network Of Network [Adapted From 10]mentioning
confidence: 99%
“…Various privacy and authentication issues have been discussed in [11]. The authors provided different authentication schemes using multi criteria classification that analyse the existing protocol.…”
Section: Cloud Computingmentioning
confidence: 99%