Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction
Authors
Keywords
-
Journal
SENSORS
Volume 21, Issue 15, Pages 5122
Publisher
MDPI AG
Online
2021-07-29
DOI
10.3390/s21155122
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- IoT Registration and Authentication in Smart City Applications with Blockchain
- (2021) Célio Márcio Soares Ferreira et al. SENSORS
- Lightweight Authentication Protocol for M2M Communications of Resource-Constrained Devices in Industrial Internet of Things
- (2020) Evangelina Lara et al. SENSORS
- Technologies Trend towards 5G Network for Smart Health-Care Using IoT: A Review
- (2020) Abdul Ahad et al. SENSORS
- A Lightweight Authentication and Key Agreement Schemes for IoT Environments
- (2020) Dae-Hwi Lee et al. SENSORS
- A Lightweight Authentication and Authorization Framework for Blockchain-Enabled IoT Network in Health-Informatics
- (2020) Muhammad Tahir et al. Sustainability
- A Survey of Internet of Things (IoT) Authentication Schemes
- (2019) Mohammed El-hajj et al. SENSORS
- A multi-level study of information trust models in WSN-assisted IoT
- (2019) Ilhem Souissi et al. Computer Networks
- Intrusion detection systems in the Internet of things: A comprehensive investigation
- (2019) Somayye Hajiheidari et al. Computer Networks
- A lightweight machine learning-based authentication framework for smart IoT devices
- (2019) P. Punithavathi et al. INFORMATION SCIENCES
- PALOT: Profiling and Authenticating Users Leveraging Internet of Things
- (2019) Pantaleone Nespoli et al. SENSORS
- Design and Implementation of High-Availability Architecture for IoT-Cloud Services
- (2019) Hyunsik Yang et al. SENSORS
- An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things
- (2019) Adel Ali Ahmed et al. SENSORS
- Survey on Access Control for Community-Centered Collaborative Systems
- (2018) Federica Paci et al. ACM COMPUTING SURVEYS
- Privacy preserving fine-grained location-based access control for mobile cloud
- (2018) Yaser Baseri et al. COMPUTERS & SECURITY
- Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
- (2018) Mohamed Tahar Hammi et al. COMPUTERS & SECURITY
- A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment
- (2018) Ruhul Amin et al. Future Generation Computer Systems-The International Journal of eScience
- A remote attestation mechanism for the sensing layer nodes of the Internet of Things
- (2018) Bei Gong et al. Future Generation Computer Systems-The International Journal of eScience
- A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection
- (2018) Preeti Mishra et al. IEEE Communications Surveys and Tutorials
- Lightweight and Practical Anonymous Authentication Protocol for RFID Systems Using Physically Unclonable Functions
- (2018) Prosanta Gope et al. IEEE Transactions on Information Forensics and Security
- PHY-Layer Authentication With Multiple Landmarks With Reduced Overhead
- (2018) Liang Xiao et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Modeling and clustering attacker activities in IoT through machine learning techniques
- (2018) Peiyuan Sun et al. INFORMATION SCIENCES
- A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
- (2018) Xiong Li et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things
- (2018) Jean Caminha et al. Security and Communication Networks
- Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity
- (2018) Dongwoo Kang et al. Security and Communication Networks
- A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function
- (2018) He Xu et al. SENSORS
- A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things
- (2018) Shi-Cho Cha et al. IEEE Access
- Trustworthy Industrial IoT Gateways for Interoperability Platforms and Ecosystems
- (2018) F. Fraile et al. IEEE Internet of Things Journal
- A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things
- (2018) Xiong Li et al. IEEE Internet of Things Journal
- IoT Security Techniques Based on Machine Learning: How Do IoT Devices Use AI to Enhance Security?
- (2018) Liang Xiao et al. IEEE SIGNAL PROCESSING MAGAZINE
- IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey
- (2018) Muhammad Burhan et al. SENSORS
- Current research on Internet of Things (IoT) security: A survey
- (2018) Mardiana binti Mohamad Noor et al. Computer Networks
- Lightweight IoT-based authentication scheme in cloud computing circumstance
- (2018) Lu Zhou et al. Future Generation Computer Systems-The International Journal of eScience
- An approach to develop the smart health using Internet of Things and authentication based on biometric technology
- (2018) Hodjat Hamidi Future Generation Computer Systems-The International Journal of eScience
- A payload-based mutual authentication scheme for Internet of Things
- (2017) Mian Ahmad Jan et al. Future Generation Computer Systems-The International Journal of eScience
- A Robust ECC based Provable Secure Authentication Protocol with Privacy Protection for Industrial Internet of Things
- (2017) Xiong Li et al. IEEE Transactions on Industrial Informatics
- Cloud-Based Malware Detection Game for Mobile Devices with Offloading
- (2017) Liang Xiao et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
- (2017) Fan Wu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO
- (2017) Antonio Celesti et al. SENSORS
- Authentication and Authorization for the Internet of Things
- (2017) Hokeun Kim et al. IT Professional
- FARE: FDD-based firewall anomalies resolution tool
- (2017) Amina Saâdaoui et al. Journal of Computational Science
- A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
- (2017) Jie Lin et al. IEEE Internet of Things Journal
- Chaotic Map-based Anonymous User Authentication Scheme with User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things
- (2017) Sandip Roy et al. IEEE Internet of Things Journal
- A Survey on Security and Privacy Issues in Internet-of-Things
- (2017) Yuchen Yang et al. IEEE Internet of Things Journal
- A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
- (2016) Ruhul Amin et al. Ad Hoc Networks
- Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks
- (2016) Ruhul Amin et al. Computer Networks
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks
- (2016) Liang Xiao et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- Secure routing for internet of things: A survey
- (2016) David Airehrour et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Security in Software-Defined Networking: Threats and Countermeasures
- (2016) Zhaogang Shu et al. MOBILE NETWORKS & APPLICATIONS
- Machine Learning Methods for Attack Detection in the Smart Grid
- (2016) Mete Ozay et al. IEEE Transactions on Neural Networks and Learning Systems
- Learning How to Communicate in the Internet of Things: Finite Resources and Heterogeneity
- (2016) Taehyeun Park et al. IEEE Access
- A Mobile Offloading Game Against Smart Attacks
- (2016) Liang Xiao et al. IEEE Access
- Security, privacy and trust in Internet of Things: The road ahead
- (2015) S. Sicari et al. Computer Networks
- Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
- (2015) Ala Al-Fuqaha et al. IEEE Communications Surveys and Tutorials
- An Efficient Distributed Trust Model for Wireless Sensor Networks
- (2015) Jinfang Jiang et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Autonomic schemes for threat mitigation in Internet of Things
- (2015) Qazi Mamoon Ashraf et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- TACIoT: multidimensional trust-aware access control system for the Internet of Things
- (2015) Jorge Bernal Bernabe et al. SOFT COMPUTING
- On modeling eavesdropping attacks in wireless networks
- (2015) Xuran Li et al. Journal of Computational Science
- Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications
- (2014) Mohammad Abu Alsheikh et al. IEEE Communications Surveys and Tutorials
- Lithe: Lightweight Secure CoAP for the Internet of Things
- (2013) Shahid Raza et al. IEEE SENSORS JOURNAL
- Proximity-Based Security Techniques for Mobile Users in Wireless Networks
- (2013) Liang Xiao et al. IEEE Transactions on Information Forensics and Security
- A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
- (2013) Zhiyuan Tan et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- Detecting and Resolving Firewall Policy Anomalies
- (2012) Hongxin Hu et al. IEEE Transactions on Dependable and Secure Computing
- In-network outlier detection in wireless sensor networks
- (2012) Joel W. Branch et al. KNOWLEDGE AND INFORMATION SYSTEMS
- Smart community: an internet of things application
- (2011) Xu Li et al. IEEE COMMUNICATIONS MAGAZINE
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started