Mohamed Amine Ferrag
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
Ferrag, Mohamed Amine; Maglaras, Leandros; Derhab, Abdelouahid
Abstract
Biofeatures are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summarise the factors that hinder biometrics models’ development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). The different machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices are provided. Threat models and countermeasures used by biometrics-based authentication schemes for mobile IoT devices are also presented. More specifically, we analyze the state of the art of the existing biometric-based authentication schemes for IoT devices. Based on the current taxonomy, we conclude our paper with different types of challenges for future research efforts in biometrics-based authentication schemes for IoT devices.
Citation
Ferrag, M. A., Maglaras, L., & Derhab, A. (2019). Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends. Security and Communication Networks, 2019, Article 5452870. https://doi.org/10.1155/2019/5452870
Journal Article Type | Article |
---|---|
Acceptance Date | Apr 22, 2019 |
Online Publication Date | May 5, 2019 |
Publication Date | May 5, 2019 |
Deposit Date | Jan 6, 2023 |
Publicly Available Date | Jan 9, 2023 |
Journal | Security and Communication Networks |
Print ISSN | 1939-0114 |
Electronic ISSN | 1939-0122 |
Publisher | Wiley |
Peer Reviewed | Peer Reviewed |
Volume | 2019 |
Article Number | 5452870 |
DOI | https://doi.org/10.1155/2019/5452870 |
Public URL | http://researchrepository.napier.ac.uk/Output/2969608 |
Files
Authentication And Authorization For Mobile IoT Devices Using Biofeatures: Recent Advances And Future Trends
(2.1 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
You might also like
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks
(2022)
Journal Article
The industrial control system cyber defence triage process
(2017)
Journal Article