2025
DOI: 10.1016/j.csa.2024.100057
|View full text |Cite
|
Sign up to set email alerts
|

Authentication, access control and scalability models in Internet of Things Security–A review

M Kokila,
Srinivasa Reddy K
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 95 publications
0
2
0
Order By: Relevance
“…IoT sensors and devices are widely used in these systems, which creates several cyberattack weaknesses. Achieving data and ML model security is crucial to prevent unauthorized access and modification (Kokila and Reddy K, 2025).…”
Section: Protection and Privacymentioning
confidence: 99%
“…IoT sensors and devices are widely used in these systems, which creates several cyberattack weaknesses. Achieving data and ML model security is crucial to prevent unauthorized access and modification (Kokila and Reddy K, 2025).…”
Section: Protection and Privacymentioning
confidence: 99%
“…Adaptive Multi-Factor Authentication (A-MFA) is an enhanced version of MFA that provides a method for allowing authorized users to access systems using different factors that change based on different considerations (Kokila & Reddy K, 2024). In other words, authentication factors include passwords, biometrics among others are selected adaptively by the authentication system based on the criteria of whether the user is trying to log in from within the system boundaries, or whether the user is trying to access during the organization's operational hours.…”
Section: Introductionmentioning
confidence: 99%