ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

User Authentication Techniques of the Internet of Things

Journal: International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE) (Vol.11, No. 4)

Publication Date:

Authors : ;

Page : 179-185

Keywords : ;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Internet of Things (IoT) is a growing technology that has got the attention of researchers from different fields. As more of IoT resources increasing, the number of users' sensitive data also increasing. Authentication process is one of the security factors which used to protect the users' sensitive data and identify whether the user is legitimate or not. IoT facing many authentication challenges due to its complicated environment it contains a massive number of connected devices, different layers, big data, cloud computing, and the open channels. The truly important challenge of the user authentication process for IoT resources is how to do it more securely and easily utilize for computer-illiterate users. In general, the password is the first defense line of user confidentiality, but the use of alphanumeric-based passwords is still widely, even with the existence of alternatives designed to overcome its weakness. Graphical-based Password is one of the practical alternatives which is developed to improve the security of the user authentication. This paper aims to explore the various authentication aspects that can be used in the IoT technology. Also, an overview of the graphical passwords which can be used as an alternative of the weak alphanumeric-based passwords in IoT technology

Last modified: 2022-08-21 14:59:58