2019
DOI: 10.1109/tce.2019.2895715
|View full text |Cite
|
Sign up to set email alerts
|

g-RAT | A Novel Graphical Randomized Authentication Technique for Consumer Smart Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
3
1

Relationship

4
6

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 22 publications
0
15
0
Order By: Relevance
“…A similar swipe-based authentication technique [35] is proposed where a user touches the screen for authentication. In contrast to existing approaches, rather than providing users with a simple 3×3 grid, image icons are given inside the grid.…”
Section: ) Graphical Randomized Authentication Technique (Grat)mentioning
confidence: 99%
“…A similar swipe-based authentication technique [35] is proposed where a user touches the screen for authentication. In contrast to existing approaches, rather than providing users with a simple 3×3 grid, image icons are given inside the grid.…”
Section: ) Graphical Randomized Authentication Technique (Grat)mentioning
confidence: 99%
“…A SERIOUS concentration has been made in the vehicular ad hoc network (VANET) technology [1], [2] since 1990s, and especially in the last decade, many advancements have been seen. Internet of Things (IoT) has been deployed (and being deployed) in various domains, such as agriculture [3], [4], healthcare [5]- [8], cloud computing [9], [10], edge computing [11], smart cities [12]- [14], smart homes [15], etc [16], [17]. However, VANETs in combination with IoT is a familiar research topic and has attracted attention from the research community at large [18].…”
Section: Introductionmentioning
confidence: 99%
“…In [63], a generic IoT trust architecture is proposed that integrates trust into all these layers as an integral component to manage security. IoT faces several security challenges [36], e.g., authentication [3,31,37,38], access control [47,60], trust management in cross domain along with smart edge nodes [6,7,9,11,33], security management in IoT equipped with VANET nodes [10,27,35,45], policy enforcement [54], secure middleware [13], and confidentiality [50].…”
Section: Introductionmentioning
confidence: 99%