2022
DOI: 10.32604/cmc.2022.020624
|View full text |Cite
|
Sign up to set email alerts
|

IoT Devices Authentication Using Artificial Neural Network

Abstract: User authentication is one of the critical concerns of information security. Users tend to use strong textual passwords, but remembering complex passwords is hard as they often write it on a piece of paper or save it in their mobile phones. Textual passwords are slightly unprotected and are easily attackable. The attacks include dictionary, shoulder surfing, and brute force. Graphical passwords overcome the shortcomings of textual passwords and are designed to aid memorability and ease of use. This paper propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 28 publications
0
1
0
Order By: Relevance
“…As a result of this, the attackers are unable to determine whether the image that was clicked was the decoy image or the registered image. In the cases of [32,33,[35][36][37][44][45][46]48,52,53], the registered icons and the decoy icons are not clicked. Consequently, it would be difficult for the attackers to make any intelligent analysis to distinguish which icons are the registered icons and which are the decoys.…”
Section: Rq2 What Pass-objects Are Used For Authentication In These M...mentioning
confidence: 99%
“…As a result of this, the attackers are unable to determine whether the image that was clicked was the decoy image or the registered image. In the cases of [32,33,[35][36][37][44][45][46]48,52,53], the registered icons and the decoy icons are not clicked. Consequently, it would be difficult for the attackers to make any intelligent analysis to distinguish which icons are the registered icons and which are the decoys.…”
Section: Rq2 What Pass-objects Are Used For Authentication In These M...mentioning
confidence: 99%
“…In the case of an outside service provider, their capability of maintaining security should be validated before obtaining any services from them. The software part must be wellprotected with login identification and a strong password, keeping it protected from unauthorized access to personal information or manipulation of device usage [41][42][43][44][45][46][47][48].…”
Section: Collaboration and Process Layermentioning
confidence: 99%