Smart City Gnosys

Smart city article details

Title Authentication, Authorization, And Anonymization Techniques In The Iot
ID_Doc 11136
Authors Sivagami V.M.; Deekshitha M.; Devi N.; Parvathi S.S.
Year 2024
Published Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation
DOI http://dx.doi.org/10.1201/9781003477327-8
Abstract The development of IoT devices and the usage of these devices by establishing communication between device users and devices have increased tremendously. Consumers implement IoT devices and smart homes, intelligent buildings, and smart cities to make people’s lives easier. Security risks are present at every step along the IoT journey and there are a bunch of hackers who take advantage of system vulnerability and every IoT device should be protected from these hackers. The first part of the chapter enumerates the vulnerabilities in IoT devices, network systems, and user and customer back-end systems. It also addresses how vulnerabilities could be mitigated for the entire IoT life cycle, especially as it scales and expands geographically. The subsequent paragraphs address authentication techniques and protocols used in IoT to provide security among IoT devices. While authorization grants permissions, authentication is the act of identifying the device. These procedures are used by IoT devices to perform role-based access control and guarantee that only authorized devices are allowed to communicate with other gadgets, software, cloud accounts, and gateways. Anonymization technologies will be a crucial component of IoT operational processes and controls surrounding big data and produce insightful data across all sectors of the economy, from gaming to government. © 2024 selection and editorial matter, T. Kavitha, M. K. Sandhya, V. J. Subashini, and Prasidh Srikanth. individual chapters, the contributors.
Author Keywords


Similar Articles


Id Similarity Authors Title Published
47934 View0.871Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
8135 View0.868Dargaoui S.; Azrour M.; Allaoui A.E.; Guezzaz A.; Alabdulatif A.; Alnajim A.An Exhaustive Survey On Authentication Classes In The Iot EnvironmentsIndonesian Journal of Electrical Engineering and Informatics, 12, 1 (2024)
32963 View0.865Dargaoui S.; Azrour M.; El Allaoui A.; Guezzaz A.; Alabdulatif A.; Alnajim A.Internet Of Things Authentication Protocols: Comparative StudyComputers, Materials and Continua, 79, 1 (2024)
47865 View0.859Awad A.I.; Abawajy J.Security And Privacy In The Internet Of Things: Architectures, Techniques, And ApplicationsSecurity and Privacy in the Internet of Things: Architectures, Techniques, and Applications (2021)
4211 View0.858Alotaibi A.; Aldawghan H.; Aljughaiman A.A Review Of The Authentication Techniques For Internet Of Things Devices In Smart Cities: Opportunities, Challenges, And Future DirectionsSensors, 25, 6 (2025)
47885 View0.851Koshy A.S.; Fatima N.; Agarwal P.; Rodrigues J.J.P.C.Security And Privacy Threats In Iot-Enabled Smart CitiesInternet of Things (2022)