Internet of Things Security, Device Authentication and Access Control: A Review.
Inayat AliSonia SabirZahid UllahPublished in: CoRR (2019)
Keyphrases
- authentication and access control
- access control
- security architecture
- security requirements
- information security
- security policies
- security issues
- virtual private network
- intrusion detection
- security model
- security mechanisms
- data security
- data integrity
- database
- statistical databases
- rfid tags
- ubiquitous computing
- network security
- lightweight
- database management systems
- information systems
- data mining