IoT Security and Authentication schemes Based on Machine Learning: Review

09/06/2021
by   Rushit Dave, et al.
0

With the latest developments in technology, extra and extra human beings depend on their private gadgets to keep their touchy information. Concurrently, the surroundings in which these gadgets are linked have grown to grow to be greater dynamic and complex. This opens the dialogue of if the modern day authentication strategies being used in these gadgets are dependable ample to preserve these user's records safe. This paper examines the distinct consumer authentication schemes proposed to make bigger the protection of exceptional devices. This article is break up into two one of a kind avenues discussing authentication schemes that use both behavioral biometrics or physical layer authentication. This survey will talk about each the blessings and challenges that occur with the accuracy, usability, and standard protection of computing device getting to know strategies in these authentication systems. This article targets to enhance in addition lookup in this subject via exhibiting the more than a few present day authentication models, their schematics, and their results.

READ FULL TEXT
research
01/27/2019

Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends

Bio-features are fast becoming a key tool to authenticate the IoT device...
research
06/15/2020

BubbleMap: Privilege Mapping for Behavior-based Implicit Authentication Systems

Implicit authentication (IA) is gaining popularity over recent years due...
research
06/13/2020

EchoIA: Implicit Authentication System Based on User Feedback

Implicit authentication (IA) transparently authenticates users by utiliz...
research
08/29/2023

Better Prefix Authentication

We present new schemes for solving prefix authentication and secure rela...
research
10/15/2021

Machine Learning Algorithms In User Authentication Schemes

In the past two decades, the number of mobile products being created by ...
research
08/07/2018

Learning-Aided Physical Layer Authentication as an Intelligent Process

Performance of the existing physical layer authentication schemes could ...
research
07/11/2019

Challenges and Directions for Authentication in Pervasive Computing

We quickly approach a "pervasive future" where pervasive computing is th...

Please sign up or login with your details

Forgot password? Click here to reset