Please use this identifier to cite or link to this item: https://dspace.univ-ouargla.dz/jspui/handle/123456789/20867
Full metadata record
DC FieldValueLanguage
dc.contributor.authorLabiod, Yasmine-
dc.contributor.authorAmmara Korba, Abdelaziz-
dc.contributor.authorGhoualmi, Nacira-
dc.contributor.authorFerrag, Mohamed Amine-
dc.date.accessioned2019-06-19T09:58:46Z-
dc.date.available2019-06-19T09:58:46Z-
dc.date.issued2019-03-05-
dc.identifier.urihttp://dspace.univ-ouargla.dz/jspui/handle/123456789/20867-
dc.descriptionLe 2eme Conference Internationale sur intelligence Artificielle et les Technologies Information ICAIIT 2019en_US
dc.description.abstractThe Internet of Things also well known as (IoT) has become an important research topic because of its rapid spread and wide deployment in different daily life aspects such as smart home, smart e-health services delivery, smart grid, vehicle connected, government control, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to countermeasure those issues and discover a better way to remove those risks, or at least reduce their effects on the user’s privacy and security requirements. This paper is mainly focusing on critical review of the recent authentication techniques for IoT devices , first we present taxonomy of the current Cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, Objectives, Countermeasures, and attacks supported of current Cryptography based authentication schemes. Finally, we make in depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environment and that are needed for improving the IoT security and to be addressed in the future.en_US
dc.language.isoenen_US
dc.publisherUniversité Kasdi Merbah Ouarglaen_US
dc.relation.ispartofseries2019;-
dc.subjectSecurityen_US
dc.subjectAuthenticationen_US
dc.subjectInternet of Things (IoT)en_US
dc.subjectCryptographyen_US
dc.titleAuthentication Schemes in Internet of Things: A reviewen_US
dc.typeArticleen_US
Appears in Collections:2. Faculté des nouvelles technologies de l’information et de la communication

Files in This Item:
File Description SizeFormat 
Yasmine Labiod.pdf654,44 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.