[HTML][HTML] A survey of identity recognition via data fusion and feature learning

Z Qin, P Zhao, T Zhuang, F Deng, Y Ding, D Chen - Information Fusion, 2023 - Elsevier
With the rapid development of the Mobile Internet and the Industrial Internet of Things, a
variety of applications put forward an urgent demand for user and device identity …

Lightweight authentication mechanism for industrial IoT environment combining elliptic curve cryptography and trusted token

YS Yang, SH Lee, JM Wang, CS Yang, YM Huang… - Sensors, 2023 - mdpi.com
With the promotion of Industry 4.0, which emphasizes interconnected and intelligent devices,
several factories have introduced numerous terminal Internet of Things (IoT) devices to …

A survey on exploring the effectiveness of iot based home security systems

SR Anupriya… - … Conference on Computer …, 2023 - ieeexplore.ieee.org
With the advancement in Internet of things smart homes are rapidly develo**. Smart home
is the major key component of Internet of thing. With the help of IOT technology we can stay …

Recent applications of federated learning in edge and iot environments: A review

MJ Diván, ML Sánchez-Reynoso… - 2021 5th International …, 2021 - ieeexplore.ieee.org
The Internet of Things has been raised as an alternative for implementing different data
collection strategies. Because of the limited hardware, it is complemented with edge …

Next-generation user authentication schemes for iot applications

S Gupta - 2020 - tesidottorato.depositolegale.it
The unprecedented rise of IoT has revolutionized every business vertical enthralling people
to embrace IoT applications in their day-to-day lives to accrue multifaceted benefits. It is …

Smart automatic accident detection & information system

S Rathor, P Dubey, S Samadhiya - … International Conference on …, 2022 - ieeexplore.ieee.org
Our lives have been made easier by the advancement of technology and infrastructure. The
introduction of technology has also led to an increase in traffic risks and accidents on the …

A Lightweight Trust Based Secure Authentication Mechanism for IoT Devices

A Thakur, P Kumar, N Chaurasia - 2023 - researchsquare.com
Abstract The Internet of Things, which is in the next phase of communication, is quickly
overtaking all other technologies. IoT enables seamless data exchange, interaction, and …

[PDF][PDF] A Cloud based System for Real-Time Remote Surveillance and Control based on the Wireless Multi-Sensor Network Inputs

MRK Jhajharia, DC Sati, V Kumar - International Research Journal …, 2020 - academia.edu
Here in this work efforts were made to exploit the potentials of a cloud based mobile app
Blynk which is specifically designed for the IoT based applications. For this purpose, a …

[PDF][PDF] A Middleware Approach for Authenticate user on IoT Devices Accessibility

MN Dandotiya, P Khatri - NEUROQUANTOLOGY, 2022 - resources.itmuniversity.ac.in
As per current networking style large number of heterogeneous or homogeneous devices
are connected over the internet. This proposed middle ware approach is helpful to stop all …

Authentication and Access Control for IoT Devices and Its Applications

KS Ananda, B Arthi, M Aruna, A Makkar… - Deep Learning for …, 2021 - taylorfrancis.com
The authentication methods for the Internet of Things (IoT). There is a variety of methods
implemented in the software industry but not all are based on the concepts of IoT. This …