2023
DOI: 10.1109/jiot.2023.3262822
|View full text |Cite
|
Sign up to set email alerts
|

Toward IoT Node Authentication Mechanism in Next Generation Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 39 publications
0
0
0
Order By: Relevance
“…In [169], the authors present a Mahalanobis distance and Chi-squared distribution RF fingerprinting approach focused on providing SEI-based authentication within 5G IoT next-generation networks. The authors show that their approach requires lower training times and fewer resources than five other SEI processes while achieving a higher average accuracy.…”
Section: Sei On Resource-constrained Devicesmentioning
confidence: 99%
“…In [169], the authors present a Mahalanobis distance and Chi-squared distribution RF fingerprinting approach focused on providing SEI-based authentication within 5G IoT next-generation networks. The authors show that their approach requires lower training times and fewer resources than five other SEI processes while achieving a higher average accuracy.…”
Section: Sei On Resource-constrained Devicesmentioning
confidence: 99%
“…Extraction of features is sometimes timeconsuming and difficult because previous machine learning algorithms mainly rely on feature engineering. Therefore, using typical machine learning techniques like DT [27], ensemble models [28], ANN [29], AE [30], RNN [31], KNN [3], and DNN [32] in real-time applications is impractical for detecting threats. Table 1 presents the review of various IDS methodologies used for protecting 5G-IoT networks.…”
Section: Related Workmentioning
confidence: 99%
“…Internet of Things (IoT) is more susceptible to the different types of intrusions or attacks, due to its tremendous growth in present days [1,2]. The effectiveness of sensitive devices may affect end users, increases cyber threats and identity theft, which also has an adverse effect on income since problems produced by IoT network are unnoticed for extended periods of time [3][4][5]. Moreover, attacks on IoT interfaces must be closely monitored in real time for ensuring safety and security.…”
Section: Introductionmentioning
confidence: 99%