Survey of Authentication and Authorization for the Internet of Things.
Michal TrnkaTomás CernýNathaniel StickneyPublished in: Secur. Commun. Networks (2018)
Keyphrases
- security requirements
- trust negotiation
- access control
- mobile devices
- conflict resolution
- fine grained
- ubiquitous computing
- key technologies
- security policies
- data collection
- security mechanisms
- authentication mechanism
- mobile computing
- security analysis
- trust management
- biometric authentication
- fragile watermarking
- supply chain
- trust relationships
- image authentication
- open standards
- literature review
- neural network
- big data
- smart card