2019
DOI: 10.1007/978-3-030-12388-8_24
|View full text |Cite
|
Sign up to set email alerts
|

Identification of Remote IoT Users Using Sensor Data Analytics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…While the IoT environment includes several devices and objects, it allows these objects to communicate and be interconnected. These connected IoT objects communicate and exchange data via the internet and can be remotely accessible, which puts them at high risk of being targeted by malicious attacks and unauthorized access [ 27 ].…”
Section: Related Workmentioning
confidence: 99%
“…While the IoT environment includes several devices and objects, it allows these objects to communicate and be interconnected. These connected IoT objects communicate and exchange data via the internet and can be remotely accessible, which puts them at high risk of being targeted by malicious attacks and unauthorized access [ 27 ].…”
Section: Related Workmentioning
confidence: 99%
“…By automating the working environment to decrease human participation and increase system efficiency, the Internet of Things (IoT) is a new technology [16]. As IoT technology continues to advance, new forms of cyberattacks are being developed daily.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Physiological characteristics include those retrieved from the human body, such as iris [4], faces [5,6], retinas, veins [7], fingerprints [8][9][10][11], palm prints, finger knuckle print, and DNA, ECG [12][13][14][15], while behavioral characteristics include voice, stride, signature, and keystroke [16][17][18][19][20]. Biometrics traits are commonly employed in systems such as Security in IoT [21][22][23][24][25], e-banking [26][27][28][29], cloud security [30][31][32][33], access control [34][35][36][37], network security systems [38][39][40][41][42], and ID cards [43][44][45][46][47], and other applications related to IoT [48][49][50]…”
Section: Introductionmentioning
confidence: 99%