Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends

01/27/2019
by   Mohamed Amine Ferrag, et al.
0

Bio-features are fast becoming a key tool to authenticate the IoT devices; in this sense, the purpose of this investigation is to summaries the factors that hinder biometrics models' development and deployment on a large scale, including human physiological (e.g., face, eyes, fingerprints-palm, or electrocardiogram) and behavioral features (e.g., signature, voice, gait, or keystroke). The different machine learning and data mining methods used by authentication and authorization schemes for mobile IoT devices are provided. Threat models and countermeasures used by biometrics-based authentication schemes for mobile IoT devices are also presented. More specifically, We analyze the state of the art of the existing biometric-based authentication schemes for IoT devices. Based on the current taxonomy, We conclude our paper with different types of challenges for future research efforts in biometrics-based authentication schemes for IoT devices.

READ FULL TEXT

page 1

page 7

research
08/01/2019

The House That Knows You: User Authentication Based on IoT Data

Home-based Internet of Things (IoT) devices have gained in popularity an...
research
09/06/2021

IoT Security and Authentication schemes Based on Machine Learning: Review

With the latest developments in technology, extra and extra human beings...
research
09/22/2017

BreathRNNet: Breathing Based Authentication on Resource-Constrained IoT Devices using RNNs

Recurrent neural networks (RNNs) have shown promising results in audio a...
research
03/23/2023

IoT trust and reputation: a survey and taxonomy

IoT is one of the fastest-growing technologies and it is estimated that ...
research
12/10/2019

Is Your Smartband Smart Enough to Know Who You Are: Towards Continuous Physiological Authentication in The Wild

The use of cloud services that process privacy-sensitive information suc...
research
04/19/2022

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

Mobile devices have been manufactured and enhanced at growing rates in t...
research
12/10/2019

Is Your Smartband Smart Enough to Know Who You Are: Continuous Physiological Authentication in The Wild

The use of cloud services that process privacy-sensitive information suc...

Please sign up or login with your details

Forgot password? Click here to reset