User authentication remains a challenging issue, despite the existence of a large number of proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web-based, and hardware-based schemes. For example, some of these schemes are not suitable for deployment in an Internet of Things (IoT) setting, partly due to the hardware and/or software constraints of IoT devices. The increasing popularity and pervasiveness of IoT equipment in a broad range of settings reinforces the importance of ensuring the security and privacy of IoT devices. Therefore, in this article, we conduct a comprehensive literature review and an empirical study to gain an in-depth understanding of the different authentication schemes as well as thei...
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from thei...
Smartphones are the most popular and widespread personal devices. Apart from their conventional use,...
Including mobile environment, conventional security mechanisms have been adapted to satisfy the need...
User authentication remains a challenging issue, despite the existence of a large number of proposed...
Internet of Things (IoT) has become one of the most significant technologies in recent years because...
Internet of Thing (IoT) is one of the most influential technologies in the present time. People, pro...
The IoT has raised a set of challenges due to the enormous amount of data processed and the complex ...
open access articleIn this paper, a comprehensive survey of authentication protocols for Internet of...
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose...
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate their di...
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and...
The Internet of things (IoT) is the technology, which forms the foundation of today;s smart and conn...
With the increased number and reduced cost of smart devices, Internet of Things (IoT) applications s...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The Internet of medical things (IoMT) provides an ecosystem in which to connect humans, devices, sen...
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from thei...
Smartphones are the most popular and widespread personal devices. Apart from their conventional use,...
Including mobile environment, conventional security mechanisms have been adapted to satisfy the need...
User authentication remains a challenging issue, despite the existence of a large number of proposed...
Internet of Things (IoT) has become one of the most significant technologies in recent years because...
Internet of Thing (IoT) is one of the most influential technologies in the present time. People, pro...
The IoT has raised a set of challenges due to the enormous amount of data processed and the complex ...
open access articleIn this paper, a comprehensive survey of authentication protocols for Internet of...
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose...
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate their di...
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and...
The Internet of things (IoT) is the technology, which forms the foundation of today;s smart and conn...
With the increased number and reduced cost of smart devices, Internet of Things (IoT) applications s...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
The Internet of medical things (IoMT) provides an ecosystem in which to connect humans, devices, sen...
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from thei...
Smartphones are the most popular and widespread personal devices. Apart from their conventional use,...
Including mobile environment, conventional security mechanisms have been adapted to satisfy the need...