Please use this identifier to cite or link to this item:
https://dspace.univ-ouargla.dz/jspui/handle/123456789/20867
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Labiod, Yasmine | - |
dc.contributor.author | Ammara Korba, Abdelaziz | - |
dc.contributor.author | Ghoualmi, Nacira | - |
dc.contributor.author | Ferrag, Mohamed Amine | - |
dc.date.accessioned | 2019-06-19T09:58:46Z | - |
dc.date.available | 2019-06-19T09:58:46Z | - |
dc.date.issued | 2019-03-05 | - |
dc.identifier.uri | http://dspace.univ-ouargla.dz/jspui/handle/123456789/20867 | - |
dc.description | Le 2eme Conference Internationale sur intelligence Artificielle et les Technologies Information ICAIIT 2019 | en_US |
dc.description.abstract | The Internet of Things also well known as (IoT) has become an important research topic because of its rapid spread and wide deployment in different daily life aspects such as smart home, smart e-health services delivery, smart grid, vehicle connected, government control, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to countermeasure those issues and discover a better way to remove those risks, or at least reduce their effects on the user’s privacy and security requirements. This paper is mainly focusing on critical review of the recent authentication techniques for IoT devices , first we present taxonomy of the current Cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, Objectives, Countermeasures, and attacks supported of current Cryptography based authentication schemes. Finally, we make in depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environment and that are needed for improving the IoT security and to be addressed in the future. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Université Kasdi Merbah Ouargla | en_US |
dc.relation.ispartofseries | 2019; | - |
dc.subject | Security | en_US |
dc.subject | Authentication | en_US |
dc.subject | Internet of Things (IoT) | en_US |
dc.subject | Cryptography | en_US |
dc.title | Authentication Schemes in Internet of Things: A review | en_US |
dc.type | Article | en_US |
Appears in Collections: | 2. Faculté des nouvelles technologies de l’information et de la communication |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Yasmine Labiod.pdf | 654,44 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.