Authentication Techniques for the Internet of Things: A Survey.
Maha SaadehAzzam SleitMohammed QatawnehWesam AlmobaideenPublished in: CCC (2016)
Keyphrases
- mobile devices
- biometric authentication
- physical world
- authentication mechanism
- key technologies
- authentication protocol
- authentication scheme
- identity authentication
- security mechanisms
- image authentication
- real time
- data encryption
- user authentication
- location information
- fragile watermarking
- artificial intelligence
- factor authentication
- semi fragile watermarking
- integrity verification
- digital watermarking
- distributed systems
- neural network