计算机科学
软件部署
生物识别
人气
认证(法律)
物联网
软件
计算机安全
软件工程
心理学
社会心理学
程序设计语言
作者
Milad Taleby Ahvanooey,Mark Xuefang Zhu,Qianmu Li,Wojciech Mazurczyk,Kim–Kwang Raymond Choo,Brij B. Gupta,Mauro Conti
出处
期刊:IEEE Internet of Things Journal
[Institute of Electrical and Electronics Engineers]
日期:2021-12-24
卷期号:9 (10): 7639-7663
被引量:9
标识
DOI:10.1109/jiot.2021.3138073
摘要
User authentication remains a challenging issue, despite the existence of a large number of proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web-based, and hardware-based schemes. For example, some of these schemes are not suitable for deployment in an Internet of Things (IoT) setting, partly due to the hardware and/or software constraints of IoT devices. The increasing popularity and pervasiveness of IoT equipment in a broad range of settings reinforces the importance of ensuring the security and privacy of IoT devices. Therefore, in this article, we conduct a comprehensive literature review and an empirical study to gain an in-depth understanding of the different authentication schemes as well as their vulnerabilities and deficits against various types of cyberattacks when applied in IoT-based systems. Based on the identified limitations, we recommend several mitigation strategies and discuss the practical implications of our findings.
科研通智能强力驱动
Strongly Powered by AbleSci AI