Internet of things security, device authentication and access control: a review

I Ali, S Sabir, Z Ullah - arXiv preprint arXiv:1901.07309, 2019 - arxiv.org
… enabling the sensing and processing of various physical phenom… accessible to
resource-constrained devices via the internet. … in the IoT ecosystem, enhancing their functionality …

Comparison of authentication methods on web resources

A Komarova, A Menshchikov, A Negols… - Proceedings of the …, 2018 - Springer
… relevance, the increasing number of patented authentication methods on web resources, as
… The aim of this research is a comparative analysis of existing methods, which confirm access…

[HTML][HTML] Systematic review of authentication and authorization advancements for the Internet of Things

M Trnka, AS Abdelfattah, A Shrestha, M Coffey, T Cerny - Sensors, 2022 - mdpi.com
… peer-reviewed articles located at major academic sources. … The reduction process with
relevant publication numbers is … : applying existing methods, extending them to better suit the IoT …

A review on authentication methods

SZS Idrus, E Cherrier, C Rosenberger… - Australian Journal of …, 2013 - hal.science
resources over a … authentication and a better authentication method. It facilitates the migration
of legacy applications that were designed to rely only on passwords (mainframes, websites

[HTML][HTML] Authentication, access control and scalability models in internet of things security-A review

M Kokila, S Reddy - Cyber Security and Applications, 2024 - Elsevier
… The authorization process allows only authenticated users to access the resources. The …
comprehensive environmental data collection and analysis for better decision-making. In …

Survey of Authentication and Authorization for the Internet of Things

M Trnka, T Cerny, N Stickney - Security and Communication …, 2018 - Wiley Online Library
… users to access specific resources or take specific actions, … for RAKE to perform any meaningful
analysis; with the second article [… Authorization is the process of granting permissions on …

[HTML][HTML] Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction

K Istiaque Ahmed, M Tahir, M Hadi Habaebi, S Lun Lau… - Sensors, 2021 - mdpi.com
… to assist in the authentication and authorization process for IoT. In … on the review, we present
a taxonomy of authentication and … authorization protocols to save resources and improve IoT …

[HTML][HTML] Access management of IoT devices using access control mechanism and decentralized authentication: A review

I Singh, B Singh - Measurement: Sensors, 2023 - Elsevier
… control methods in IoT device modes with limited resources. Numerous studies have examined
the usage of Blockchain in the Internet … can potentially improve IoT access management. …

[PDF][PDF] Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing.

A Alsirhani, M Ezz, AM Mostafa - Computer Systems Science & …, 2022 - academia.edu
… This paper proposes a comprehensive review of security services and threats. Based on the
… , while the authorization process is based on granting or denying cloud resources based on …

Authentication and authorization security solution for the internet of thing

M Dammak - 2021 - theses.hal.science
… this thesis definitely help improving the quality and presentation … I gratefully acknowledge
the funding sources that made my … We review IoT systems for each architecture in compliance …