Advances in AI for Financial, Cyber, and Healthcare Analytics: A Multidisciplinary Approach

Secure Interaction-based Identification System: A Technique for Smart Home Authentication

Author(s): Mahesh K. Singh*, G. J. Lakshmi, V. Satyanarayana and Sanjeev Kumar

Pp: 82-93 (12)

DOI: 10.2174/9798898810542125010009

* (Excluding Mailing and Handling)

Abstract

Applications that make use of the Internet of Things (IoT), such as the smart home (S-home), are growing in popularity as more and more smart gadgets are becoming available and affordable. However, existing authentication solutions may not be adequate for protecting IoT settings due to the peculiarities of these contexts, such as the utilization of devices with limited resources. This has led to the development of a variety of different authentication techniques that are specifically designed for the environment of the Internet of Things. An exhaustive overview of the current authentication techniques is given in this work. This chapter presents noteworthy contributions, which are outlined as follows: It begins by introducing a general model that was created using an S-Home use-case scenario. In order to identify potential entry points for an attack, it then conducts a threat assessment using the model as a basis. The study can be considered successful if it defines a workable set of security requirements for creating S-home authentication solutions. Third, based on the needs, a comparison of the current authentication methods is conducted, and recommendations are provided for achieving effective and efficient authentication in IoT settings. IoT computing provides additional benefits to users through the use of internet-connected smart appliances, objects, and gadgets. It is vital to process the data generated by intelligent IoT devices securely.


Keywords: Authentication, IoT, Internet of things, S-home, Security.

Related Journals
Related Books
© 2025 Bentham Science Publishers | Privacy Policy