Skip navigation


Please use this identifier to cite or link to this item: http://localhost:8080/xmlui/handle/123456789/3530
Full metadata record
DC FieldValueLanguage
dc.contributor.authorShilpa B., Sarvaiya-
dc.contributor.authorSherekar, Swati S-
dc.contributor.authorThakare, V.M.-
dc.contributor.authorSherekar, Alisa-
dc.date.accessioned2022-12-29T09:44:46Z-
dc.date.available2022-12-29T09:44:46Z-
dc.date.issued2019-02-10-
dc.identifier.urihttp://192.168.3.232:8080/jspui/handle/123456789/3530-
dc.description.abstractThe Internet of Things (IoT) comprises a complex network of smart devices, which frequently exchange data through the Internet. Given the significant growth of IoT as a new technological paradigm, which may involve safety-critical operations and sensitive data to be put online, its security aspect is vital. This paper studies the Taxonomy of security attacks within IoT networks is constructed to assist IoT developers for better awareness of the risk of security flaws so that better protections shall be incorporated.Internet of Things (IoT) is slowly but steadily becoming part of different aspects of our lives, with applications ranging from smart homes, to wearable devices, to healthcare, etc. This wide spectrum of applications results in shared data containing large amount of users’ private information. The security of such information becomes a paramount concern. The IoT security requirements include data confidentiality, data integrity, authentication, access control, privacy, etc. In particular, authentication of IoT devices has a particular importance given the variety of attacks which might result from its breach .This paper also provides a survey of the different authentication schemes proposed in the literature. The survey aims to help other researchers in delving into the details of such techniques by going through their classification and comparison. The classification has been done based on the inherent features of these authentication techniques such as being distributed vs. centralized, flat vs. hierarchical, and more others. A comparison between these techniques according to the used evaluation models and their security analysis is illustrated.en_US
dc.subject-Internet of Things (IOT)en_US
dc.subjectIoT Securityen_US
dc.subjectSecurity Attacksen_US
dc.subjectTaxonomyen_US
dc.subjectAuthenticationen_US
dc.titleTaxonomy of Authentication Techniques in Security Attacks of Internet of Thingsen_US
Appears in Collections:MCA

Files in This Item:
File Description SizeFormat 
110 C- Final Computer Science- Vidyabharati College Research Journey.pdf6.38 MBUnknownView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.