2019
DOI: 10.1155/2019/5452870
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends

Abstract: Bio-features are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summaries the factors that hinder biometrics models' development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). The different machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 58 publications
(25 citation statements)
references
References 105 publications
(196 reference statements)
0
25
0
Order By: Relevance
“…• A masquerade attack aims to masquerade as a legitimate node to log into the server at agriculture sensors layer (i.e., log into the access point) or fog computing layer (i.e., log into the fog node). The authentication protocols for securing IoT networks use three techniques against masquerade attacks, namely, 1) behavioral features-based biometric (e.g., keystroke, signature, gait, or voice), 2) human physiological-based biometric (e.g., fingerprint palm, electrocardiogram, eyes, or face), 3) hashing functions, 4) Elliptic curve cryptosystem, and 5) pairing-based cryptography [63].…”
Section: B Attacks Against Authenticationmentioning
confidence: 99%
“…• A masquerade attack aims to masquerade as a legitimate node to log into the server at agriculture sensors layer (i.e., log into the access point) or fog computing layer (i.e., log into the fog node). The authentication protocols for securing IoT networks use three techniques against masquerade attacks, namely, 1) behavioral features-based biometric (e.g., keystroke, signature, gait, or voice), 2) human physiological-based biometric (e.g., fingerprint palm, electrocardiogram, eyes, or face), 3) hashing functions, 4) Elliptic curve cryptosystem, and 5) pairing-based cryptography [63].…”
Section: B Attacks Against Authenticationmentioning
confidence: 99%
“…Benefiting from a combination of passwords, smart cards, and biometrics, the multi-factor authentication (MFA) approach [50] is becoming popular for mobile IoT devices [51]. Compared with a single-factor system, it provides an additional tier of security in case one factor becomes compromised.…”
Section: Related Workmentioning
confidence: 99%
“…In modern world mobile devices are indispensable in our everyday life, as their applications are exorbitant. Performing biometric authentication through mobile devices can provide a stronger mechanism for identity verification as the two authentication factors, "something you have" and "something you are," are combined [134]. The smartphone ecosystem can be built based on existing ecosystem that allows to define and enforce custom security policies which are necessary for IoT devices and ecosystem [64].…”
Section: B Rq2 How Mobile Computing Provides Security Options To Enmentioning
confidence: 99%