Internet of things security, device authentication and access control: a review
… enabling the sensing and processing of various physical phenom… accessible to
resource-constrained devices via the internet. … in the IoT ecosystem, enhancing their functionality …
resource-constrained devices via the internet. … in the IoT ecosystem, enhancing their functionality …
Comparison of authentication methods on web resources
A Komarova, A Menshchikov, A Negols… - Proceedings of the …, 2018 - Springer
… relevance, the increasing number of patented authentication methods on web resources, as
… The aim of this research is a comparative analysis of existing methods, which confirm access…
… The aim of this research is a comparative analysis of existing methods, which confirm access…
[HTML][HTML] Systematic review of authentication and authorization advancements for the Internet of Things
… peer-reviewed articles located at major academic sources. … The reduction process with
relevant publication numbers is … : applying existing methods, extending them to better suit the IoT …
relevant publication numbers is … : applying existing methods, extending them to better suit the IoT …
A review on authentication methods
… resources over a … authentication and a better authentication method. It facilitates the migration
of legacy applications that were designed to rely only on passwords (mainframes, websites…
of legacy applications that were designed to rely only on passwords (mainframes, websites…
[HTML][HTML] Authentication, access control and scalability models in internet of things security-A review
… The authorization process allows only authenticated users to access the resources. The …
comprehensive environmental data collection and analysis for better decision-making. In …
comprehensive environmental data collection and analysis for better decision-making. In …
Survey of Authentication and Authorization for the Internet of Things
… users to access specific resources or take specific actions, … for RAKE to perform any meaningful
analysis; with the second article [… Authorization is the process of granting permissions on …
analysis; with the second article [… Authorization is the process of granting permissions on …
[HTML][HTML] Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction
… to assist in the authentication and authorization process for IoT. In … on the review, we present
a taxonomy of authentication and … authorization protocols to save resources and improve IoT …
a taxonomy of authentication and … authorization protocols to save resources and improve IoT …
[HTML][HTML] Access management of IoT devices using access control mechanism and decentralized authentication: A review
I Singh, B Singh - Measurement: Sensors, 2023 - Elsevier
… control methods in IoT device modes with limited resources. Numerous studies have examined
the usage of Blockchain in the Internet … can potentially improve IoT access management. …
the usage of Blockchain in the Internet … can potentially improve IoT access management. …
[PDF][PDF] Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing.
… This paper proposes a comprehensive review of security services and threats. Based on the
… , while the authorization process is based on granting or denying cloud resources based on …
… , while the authorization process is based on granting or denying cloud resources based on …
Authentication and authorization security solution for the internet of thing
M Dammak - 2021 - theses.hal.science
… this thesis definitely help improving the quality and presentation … I gratefully acknowledge
the funding sources that made my … We review IoT systems for each architecture in compliance …
the funding sources that made my … We review IoT systems for each architecture in compliance …