Javascript must be enabled to continue!
Authentication and Access Control Mechanisms to Secure IoT Environments: A comprehensive SLR
View through CrossRef
Due to the rapid growth of the Internet of Things (IoT), securing communications between a huge number of devices has become very difficult. Access controls and authentication secure the connection between IoT devices and protect sensitive data from unauthorized users or malicious attackers. In this paper, we provide a comprehensive review to emphasize the critical role of authentication and access control in securing IoT environments. This paper explores different types of access controls, like Attribute-Based Access Control and Role-Based Access Control. Furthermore, it demonstrates different authentication techniques, like passwords and biometrics. Based on the previous mechanisms, we discuss different IoT security challenges regarding authentication and access control mechanisms and highlight future directions. In addition, this paper investigates the integration between access control and authentication to safeguard IoT communications.
Title: Authentication and Access Control Mechanisms to Secure IoT Environments: A comprehensive SLR
Description:
Due to the rapid growth of the Internet of Things (IoT), securing communications between a huge number of devices has become very difficult.
Access controls and authentication secure the connection between IoT devices and protect sensitive data from unauthorized users or malicious attackers.
In this paper, we provide a comprehensive review to emphasize the critical role of authentication and access control in securing IoT environments.
This paper explores different types of access controls, like Attribute-Based Access Control and Role-Based Access Control.
Furthermore, it demonstrates different authentication techniques, like passwords and biometrics.
Based on the previous mechanisms, we discuss different IoT security challenges regarding authentication and access control mechanisms and highlight future directions.
In addition, this paper investigates the integration between access control and authentication to safeguard IoT communications.
Related Results
Systematic Literature Review di Bidang Sistem Informasi dan Ilmu Komputer
Systematic Literature Review di Bidang Sistem Informasi dan Ilmu Komputer
<p class="Abstrak">Salah satu pendekatan studi pustaka adalah <em>Systematic Literature Review</em> (SLR). Walaupun sudah terdapat banyak naskah berbahasa Indones...
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Blockchain-Based Anonymous Authentication in Edge Computing Environment
Authentication is an important requirement for the security of edge computing applications. The existing authentication schemes either frequently rely on third-party trusted author...
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
An Efficient Blockchain-Based Verification Scheme with Transferable Authentication Authority
Abstract
In some situations, the transfer of authentication authority is necessary for user authentication. In traditional authentication, a trust mechanism based on a trus...
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
An Authentication and Key Agreement Scheme Based on Roadside Unit Cache for VANET
Vehicular Ad Hoc Network (VANET) is a wireless Mobile Ad Hoc Network that is used for communication between vehicles, vehicles and fixed access points, and vehicles and pedestrians...
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key
The security of Quantum Secure Direct Communication (QSDC) and its authentication procedure based on multiple stages is analyzed. The security analysis shows that the process of au...
E-Authentication System using QR Code and OTP
E-Authentication System using QR Code and OTP
This paper proposes an authentication system that combines One-Time Password (OTP) and Quick Response (QR) code technologies to enhance security and user experience. The system gen...
A Comprehensive Review of IoT Security: Challenges, Authentication Mechanisms
A Comprehensive Review of IoT Security: Challenges, Authentication Mechanisms
The integration of IoT, blockchain, cloud computing, and encryption is transforming healthcare systems by addressing key challenges in security, privacy, and data management. This ...
Smart Chatbot for User Authentication
Smart Chatbot for User Authentication
Despite being the most widely used authentication mechanism, password-based authentication is not very secure, being easily guessed or brute-forced. To address this, many systems w...

