IoT Security 2019
DOI: 10.1002/9781119527978.ch7
|View full text |Cite
|
Sign up to set email alerts
|

Biometric‐Based Robust Access Control Model for Industrial Internet of Things Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…Healthcare providers should use digital solutions in hospitals to ensure that their infrastructure is well managed and that they have adequate opportunities to engage themselves with IT service providers [ 15 , 16 ]. Cost-effectiveness, collaborative resource sharing, scalability, and agility enhancement are some of the other advantages of mobile and cloud computing [ 17 ].…”
Section: Introductionmentioning
confidence: 99%
“…Healthcare providers should use digital solutions in hospitals to ensure that their infrastructure is well managed and that they have adequate opportunities to engage themselves with IT service providers [ 15 , 16 ]. Cost-effectiveness, collaborative resource sharing, scalability, and agility enhancement are some of the other advantages of mobile and cloud computing [ 17 ].…”
Section: Introductionmentioning
confidence: 99%
“…Possible components that may be used in the proposed system Therefore, the total number of trails and trust of the user are given by Equations ( 11) and (12), respectively.…”
Section: Mathematical Modelmentioning
confidence: 99%
“…[11]. Other similar mobile applications will welcome the power‐saving abilities of our proposed system [12–14]. In general, the proposed system can be used in applications anywhere where resource‐constrained IoT provides services that require a biometric system.…”
Section: Introductionmentioning
confidence: 99%
“…Mechanisms, such as multifactor authentication, 34 lightweight security certificates, 29 blockchain‐based approaches, 30,31 and so on, have been talked about in various literature. Various researchers have proposed lightweight biometric‐based user authentication and access control methods 23,32 …”
Section: Literature Reviewmentioning
confidence: 99%