Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review.
Elham EbrahimpourShahram BabaiePublished in: Int. J. Inf. Sec. (2024)
Keyphrases
- literature review
- open issues
- security protocols
- authentication protocol
- security mechanisms
- cryptographic protocols
- security services
- semi fragile watermarking
- key distribution
- case study
- detect malicious
- future trends
- fuzzy theory
- mobile devices
- design science
- information systems development
- digital watermarking
- security properties
- public libraries
- current issues
- smart card
- resource constrained
- trusted third party
- security requirements
- key technologies
- authentication scheme
- biometric authentication
- security analysis
- standard model
- key management
- biometric template
- security issues
- access control
- user authentication
- image authentication
- rfid tags