2022
DOI: 10.1109/jiot.2021.3138073
|View full text |Cite
|
Sign up to set email alerts
|

Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey

Abstract: User authentication remains a challenging issue, despite the existence of a large number of proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web-based, and hardware-based schemes. For example, some of these schemes are not suitable for deployment in an Internet of Things (IoT) setting, partly due to the hardware and/or software constraints of IoT devices. The increasing popularity and pervasiveness of IoT equipment in a broad range of settings reinforces the importance of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 142 publications
0
2
0
Order By: Relevance
“…The findings of this study shed light on the relationships between brand awareness (BA), perceived quality (PQ), perceived prestige value (PV), price premium (PP), brand preference (BP), and purchase intention in the context of smartphones [95][96][97]. The results indicate interesting variations across different countries and brands, revealing valuable insights into consumer behavior.…”
Section: Discussionmentioning
confidence: 79%
“…The findings of this study shed light on the relationships between brand awareness (BA), perceived quality (PQ), perceived prestige value (PV), price premium (PP), brand preference (BP), and purchase intention in the context of smartphones [95][96][97]. The results indicate interesting variations across different countries and brands, revealing valuable insights into consumer behavior.…”
Section: Discussionmentioning
confidence: 79%
“…Various hardware-based authentication mechanisms [24], [14] are proposed to secure IoT authentication. These approaches consider various hardware features such as physical signal characteristics [36], [26], magnetic characteristics [21], sensors with human interaction [49], [38], [59], or physically unclonable functions (PUFs) [42].…”
Section: A Hardware-based Authenticationmentioning
confidence: 99%
“…This is one of the principal requirements for any communication system and ensures that the right users (e.g., patients and physicians in a smart healthcare system) or devices (e.g., nodes and aggregators) can get access to the resources or take certain actions, and the services provided by an IoT network [77]. For example, granting access to the electronic health records and patient records.…”
Section: Authentication and Authorizationmentioning
confidence: 99%