Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
User Authentication in the IoT and IIoT Environment

User Authentication in the IoT and IIoT Environment

Ahmed Mahfouz
Copyright: © 2024 |Pages: 26
ISBN13: 9798369334515|ISBN13 Softcover: 9798369350621|EISBN13: 9798369334522
DOI: 10.4018/979-8-3693-3451-5.ch008
Cite Chapter Cite Chapter

MLA

Mahfouz, Ahmed. "User Authentication in the IoT and IIoT Environment." Smart and Agile Cybersecurity for IoT and IIoT Environments, edited by Qasem Abu Al-Haija, IGI Global, 2024, pp. 169-194. https://doi.org/10.4018/979-8-3693-3451-5.ch008

APA

Mahfouz, A. (2024). User Authentication in the IoT and IIoT Environment. In Q. Al-Haija (Ed.), Smart and Agile Cybersecurity for IoT and IIoT Environments (pp. 169-194). IGI Global. https://doi.org/10.4018/979-8-3693-3451-5.ch008

Chicago

Mahfouz, Ahmed. "User Authentication in the IoT and IIoT Environment." In Smart and Agile Cybersecurity for IoT and IIoT Environments, edited by Qasem Abu Al-Haija, 169-194. Hershey, PA: IGI Global, 2024. https://doi.org/10.4018/979-8-3693-3451-5.ch008

Export Reference

Mendeley
Favorite

Abstract

This chapter delves deep into the issue of user authentication in the environment of the internet of things (IoT) and industrial internet of things (IIoT). It's a journey defined by security implications, presented trends, and analyzed conventional practices, all of which set the stage for further examination. The authors explore the challenges and limitations of involving user authentication in the context of interacting ecosystems, and then they dive into the exciting world of the latest advancements aimed at ensuring higher security and privacy. These include blockchain-based tools, multi-modal authentication, and zero-trust paradigms. Also, they navigate the legislative landscape, provide compliance recommendations, and provide relevant tips for the establishment of strong authentication practices. Through captivating case studies and real-world applications, they draw a clear picture of the importance of user authentication in safeguarding IoT and IIoT systems against evolving cyber threats.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.