z-logo
open-access-imgOpen Access
Security of IoT Automated Devices Using Different Authentication Methods
Author(s) -
N. Sathish Kumar,
Pushpneel Verma,
Ajay Vikram Singh
Publication year - 2022
Publication title -
international journal of computer science and mobile computing
Language(s) - English
Resource type - Journals
ISSN - 2320-088X
DOI - 10.47760/ijcsmc.2022.v11i02.014
Subject(s) - computer science , authentication (law) , computer security , biometrics , internet of things , field (mathematics) , variety (cybernetics) , confidentiality , hacker , process (computing) , artificial intelligence , mathematics , pure mathematics , operating system
Internet of Things (IoT) has brought significant change to the real world and has impacted every aspect of our lives. The acceptance by users of IoT is extremely significant and its widespread use is due to the availability of autonomous devices. A wide acceptance of IoT in applications in every field is constantly gathering sensitive data and providing an increased surface for hackers. Therefore, privacy-preserving authentication and access control are major issues in the field of research. Methods/Statistical Analysis This paper will look at the ways to secure the authentication of sensors-enabled autonomous devices in the IoT. Additionally, for the purpose of ensuring confidentiality during communications, there are a variety of Authentication methods that meet the requirements of Security. Results: Insecure authentication process biometrics, PINs, and other methods offer additional security for IoT that is autonomously implemented. Also, Finger vein technology is one part that IoT could have a significant impact in protecting their devices. 3D Face detection is the most advanced form of 2D face detection. It enhances the processing and processing speed of image capture.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here