AI-powered biometrics for Internet of Things security: A review and future vision

AI Awad, A Babu, E Barka, K Shuaib - Journal of Information Security and …, 2024 - Elsevier
Biometrics is a set of advanced technologies that use the physical or behavioral
characteristics of individuals to provide reliable access control. With the rapid development …

VisGIN: Visibility graph neural network on one-dimensional data for biometric authentication

Hİ Aslan, C Choi - Expert Systems with Applications, 2024 - Elsevier
The research community has extensively utilized biometrics, which is one of the most
prominent sources of knowledge for authentication schemes in the rapidly advancing field of …

DFS-WR: A novel dual feature selection and weighting representation framework for classification

Z Zhang, F Zhang, L Mao, C Chen, H Ning - Information Fusion, 2024 - Elsevier
Classification methods relying on multidimensional features have been widely applied in
commerce, healthcare, and transportation. Nevertheless, haphazardly selecting …

[PDF][PDF] Internet of Things Authentication Protocols: Comparative Study.

S Dargaoui, M Azrour, A El Allaoui… - … Materials & Continua, 2024 - cdn.techscience.cn
Nowadays, devices are connected across all areas, from intelligent buildings and smart
cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things …

Electrocardiogram identification based on data generative network and non-fiducial data processing

Z Gong, Z Tang, Z Qin, X Su, C Choi - Computers in Biology and Medicine, 2024 - Elsevier
Nowadays, the use of biological signals as a criterion for identity recognition has gained
increasing attention from various organizations and companies. Therefore, it has become …

[HTML][HTML] An exhaustive survey on authentication classes in the IoT environments

S Dargaoui, M Azrour, A El Allaoui… - … Journal of Electrical …, 2024 - section.iaesonline.com
In today's world, devices are interconnected across various fields, ranging from intelligent
buildings and smart cities to Industry 4.0 and smart healthcare. IoT security is still the biggest …

Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination

CJ Chew, PY Wang, JS Lee - KSII Transactions on Internet and …, 2023 - koreascience.kr
For effectively lowering down the risk of cyber threating, the zero-trust architecture (ZTA) has
been gradually deployed to the fields of smart city, Internet of Things, and cloud computing …

A New Blockchain-Based Authentication Infrastructure For Wireless Networks: BCAUTH

E Açıkgözoğlu, R Gürfidan - 21. Yüzyılda Fen ve Teknik, 2023 - dergipark.org.tr
Authentication in wireless networks is the process of verifying the identity of users to
authorize them to access the wireless network. This process is critical to ensure network …