2020
DOI: 10.1109/access.2020.2998412
|View full text |Cite
|
Sign up to set email alerts
|

Authentication of Remote IoT Users Based on Deeper Gait Analysis of Sensor Data

Abstract: In IoT based systems, authentication of users and devices is a major challenge where the traditional authentication mechanisms such as login-password are no longer supportable. It requires continuous authentication methods to ensure authenticity of the users and devices specifically for long sessions. The authentication through the IoT-Sensors based data has already gained the attention of a considerable number of researchers as it does not require direct involvement of the users and provide an extra layer of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0
3

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 35 publications
(37 reference statements)
0
9
0
3
Order By: Relevance
“…This taxonomy process produces the following eight categories, are shown in Figure 3 with their included number of publications: Authentication : [ 12 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , ...…”
Section: Taxonomy and Trendsmentioning
confidence: 99%
See 3 more Smart Citations
“…This taxonomy process produces the following eight categories, are shown in Figure 3 with their included number of publications: Authentication : [ 12 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , ...…”
Section: Taxonomy and Trendsmentioning
confidence: 99%
“…Authentication : [ 12 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 , 52 , 53 , 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , 71 , 72 , 73 ,...…”
Section: Taxonomy and Trendsunclassified
See 2 more Smart Citations
“…To further extend the IoT potentials, recent research has focused on enhancing the data collection and analysis capabilities, and flexible sensor configuration within the IoT platform. Although the IoT sensor hierarchy includes many different levels such as raw data collection and analysis [ 24 , 25 , 26 , 27 , 28 , 29 ], motion detection [ 30 , 31 , 32 ], object analysis [ 33 , 34 , 35 ], activity monitoring [ 36 , 37 , 38 , 39 ], and context computation [ 40 , 41 , 42 , 43 , 44 ], the physical level of gathering raw data must be of primary concern. That is, as a massive number of wireless sensors carrying a massive amount of data at different frequencies, the antenna technologies capturing the required data at the desired frequencies must be ensured.…”
Section: Introductionmentioning
confidence: 99%