z-logo
open-access-imgOpen Access
Enhancing security in Internet of Things using authentication techniques: A review survey
Author(s) -
Mohit Goyal
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/2007/1/012023
Subject(s) - computer science , computer security , biometrics , authentication (law) , the internet , internet of things , task (project management) , world wide web , engineering , systems engineering
Internet of Things (IoT) is an interrelation of heterogeneous physical devices over the network. It can assist the people by utilizing the latest technology through machine-to-machine (M2M) communication everywhere throughout the world. In general, IoT is connected with millions of individuals and computers and also provides the services among these with the help of sensors and actuators, etc. Actually, providing security to all users and its supported devices is a daunting task because as technology continues to grow, similarly various types of security threat and challenges are developing. The main objective is to enhance the security in the Internet of Things so that the existing system can be made more reliable as per user perspectives. To make more secure systems, have to use reliable security techniques and latest standards as per present era development since the old security standard is not sufficient for the user which uses the equipment’s according to the latest technology in IoT. So, biometric-based authentication is considered as the solution from preventing the new security threats in the IoT system. In any IoT system, biometric-based authentication can be implemented by using two approaches; one physical-based biometric authentication and another is behavioural-based authentication. In this paper, behavioral-based biometrics is the estimation and recording of personal behaviour patterns and also their utilization to check and validate an individual computer user using some machine learning algorithms to authenticate the IoT devices.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here