Abstract

The ability to give typical gadgets an extra technique for distinguishing proof and correspondence is known as the Internet of Things (IoT). The scope of IoT application spaces is extremely wide and incorporates things like wearables, savvy urban areas, shrewd homes, and e-wellbeing. Accordingly, many billions or perhaps many billions of gadgets will be connected together. These shrewd gadgets will actually want to assemble information, process it, and, surprisingly, come to decisions all alone. In these circumstances, security is totally important, and authentication specifically is of extraordinary significance given the potential mischief that could result from a maverick unauthenticated gadget in an IoT framework. IoT has as of late arisen as the state-of-the-art innovation that is intensely affecting business, medical services, and military applications. Remote correspondences are especially powerless to security takes a chance since anything associated with the internet is an objective for programmers and a possible wellspring of cyberattacks. Numerous IoT issues are presenting security gambles and forestalling Start to finish encryption during information transmission. Most of IoT gadgets presently being used don't have further developed arrangements or security systems, which makes them helpless against programmer assaults.

Keywords:
Internet of Things Computer science Authentication (law) Computer security Computer network The Internet Authentication protocol Internet privacy World Wide Web

Metrics

68
Cited By
29.89
FWCI (Field Weighted Citation Impact)
24
Refs
0.99
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
IoT and Edge/Fog Computing
Physical Sciences →  Computer Science →  Computer Networks and Communications
© 2026 ScienceGate Book Chapters — All rights reserved.