Continuous Authentication in Internet-of-Things Systems
-
Published:2024-06
Issue:3
Volume:55
Page:621-623
-
ISSN:1063-7796
-
Container-title:Physics of Particles and Nuclei
-
language:en
-
Short-container-title:Phys. Part. Nuclei
Author:
Matiushin I.,Korkhov V.
Publisher
Pleiades Publishing Ltd
Reference7 articles.
1. Verizon 2022 Data Breach Investigations Report. https:// www.verizon.com/business/resources/reports/dbir/ 2022/master-guide/. Accessed September 10, 2023.
2. I. Matiushin and V. Korkhov, “Continuous authentication methods for zero-trust cybersecurity architecture,” in Proceedings of Workshops on Computational Science and Its Applications (ICCSA 2023), Athens, Greece,
2023, pp. 334–351. https://doi.org/10.1007/978-3-031-37120-2_22
3. F. Al-Naji and R. Zagrouba, “CAB-IoT: Continuous authentication architecture based on blockchain for internet of things,” J. King Saud Univ. Comput. Inf. Sci. 34, 2497–2514 (2020). https://doi.org/10.1016/j.jksuci.2020.11.023
4. M. Shahzad and M. P. Singh, “Continuous authentication and authorization for the Internet of Things,” IEEE Internet Comput. 21, 86–90 (2017). https://doi.org/10.1109/MIC.2017.33
5. Y.-H. Chuang et al., “A lightweight continuous authentication protocol for the Internet of Things,” Sensors 18, No. 4 (2018). https://doi.org/10.3390/s18041104