Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review
by
Khalid, Mohd Nor Akmal
, Nor Rashid, Fadilla Atyka
, Suhaimi, Nur Hanis Sabrina
, Kamarudin, Nazhatul Hafizah
, Mohd Ali, Fazlina
in
Access control
/ Analysis
/ Authentication
/ Authentication protocols
/ Automation
/ Blockchain
/ Collaboration
/ Computer network protocols
/ Confidentiality
/ Connectivity
/ Cybersecurity
/ Data encryption chips
/ Data integrity
/ Data security
/ Internet
/ Internet of Things
/ Interoperability
/ Medical equipment
/ Multiple criterion
/ Privacy
/ Questions
/ Security management
/ Sensors
/ Smart cities
/ Symmetry
/ Usability
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review
by
Khalid, Mohd Nor Akmal
, Nor Rashid, Fadilla Atyka
, Suhaimi, Nur Hanis Sabrina
, Kamarudin, Nazhatul Hafizah
, Mohd Ali, Fazlina
in
Access control
/ Analysis
/ Authentication
/ Authentication protocols
/ Automation
/ Blockchain
/ Collaboration
/ Computer network protocols
/ Confidentiality
/ Connectivity
/ Cybersecurity
/ Data encryption chips
/ Data integrity
/ Data security
/ Internet
/ Internet of Things
/ Interoperability
/ Medical equipment
/ Multiple criterion
/ Privacy
/ Questions
/ Security management
/ Sensors
/ Smart cities
/ Symmetry
/ Usability
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review
by
Khalid, Mohd Nor Akmal
, Nor Rashid, Fadilla Atyka
, Suhaimi, Nur Hanis Sabrina
, Kamarudin, Nazhatul Hafizah
, Mohd Ali, Fazlina
in
Access control
/ Analysis
/ Authentication
/ Authentication protocols
/ Automation
/ Blockchain
/ Collaboration
/ Computer network protocols
/ Confidentiality
/ Connectivity
/ Cybersecurity
/ Data encryption chips
/ Data integrity
/ Data security
/ Internet
/ Internet of Things
/ Interoperability
/ Medical equipment
/ Multiple criterion
/ Privacy
/ Questions
/ Security management
/ Sensors
/ Smart cities
/ Symmetry
/ Usability
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review
Journal Article
Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review
2024
Request Book From Autostore
and Choose the Collection Method
Overview
In the rapidly expanding domain of the Internet of Things (IoT), ensuring the implementation of robust security measures such as authentication has become paramount to safeguarding sensitive data and maintaining the integrity of connected devices. Symmetry in the IoT commonly denotes the uniformity or equilibrium in data distribution and processing across devices or nodes in a network. Leveraging symmetric patterns can enhance the robustness and scalability of IoT authentication. This scoping review aims to provide a comprehensive overview of recent developments in authentication techniques within the IoT paradigm. It subsequently presents recent research on various IoT authentication schemes, organized around several key research questions. The objective is to decipher the intricacies associated with authentication in the IoT by employing a multi-criteria classification approach. This involves a comprehensive analysis of existing authentication protocols, delineating their respective advantages and disadvantages, and gaining insights into the associated security concerns. The research questions highlighted in the review aim to probe the present scenario of authentication systems utilized in IoT, with a focus on identifying trends and discerning shifts. This review synthesizes insights from scholarly articles to provide a roadmap for future research in IoT authentication. It functions as a valuable resource for establishing theoretical foundations and provides practical implications applicable to practitioners, policymakers, and researchers alike. By elucidating the intricacies of IoT authentication, this review cultivates a profound understanding of the transformative potential and the multifaceted challenges. It establishes the foundation for resilient security measures essential for the sustainable growth of the Internet of Things.
This website uses cookies to ensure you get the best experience on our website.