Skip to main content
Top

2019 | OriginalPaper | Chapter

A Bibliometric Analysis of Authentication and Access Control in IoT Devices

Authors : Samuel Grooby, Tooska Dargahi, Ali Dehghantanha

Published in: Handbook of Big Data and IoT Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In order to be considered secure, the devices which make up the Internet of Things (IoT) need access control and authentication methods which are resilient against a wide range of attacks. This paper provides a bibliometric analysis of available academic research papers in this area from 2008 to 2017. We used a dataset of 906 academic papers and analysed the most productive countries, journals, authors and research institutions, as well as looking at the most common research areas, keywords and the most highly cited articles. We then looked at the trends in each country’s production finding that overall production is increasing as well as the number of countries contributing. We found that the countries of India, South Korea and USA are rising in their proportional contribution to the dataset whereas the established leader in production, China, is decreasing in dominance. Trends in keyword use showed that the proportion of research relating to Wireless Sensor Networks and RFID technology is decreasing, while the proportion of research into the area of IoT privacy is growing.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference G. Epiphaniou, P. Karadimas, D. K. Ben Ismail, H. Al-Khateeb, A. Dehghantanha, and K.-K. R. Choo, “Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks,” IEEE Internet Things J., pp. 1–1, 2017. G. Epiphaniou, P. Karadimas, D. K. Ben Ismail, H. Al-Khateeb, A. Dehghantanha, and K.-K. R. Choo, “Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks,” IEEE Internet Things J., pp. 1–1, 2017.
2.
go back to reference M. Conti, A. Dehghantanha, K. Franke, and S. Watson, “Internet of Things security and forensics: Challenges and opportunities,” Futur. Gener. Comput. Syst., vol. 78, pp. 544–546, Jan. 2018. M. Conti, A. Dehghantanha, K. Franke, and S. Watson, “Internet of Things security and forensics: Challenges and opportunities,” Futur. Gener. Comput. Syst., vol. 78, pp. 544–546, Jan. 2018.
3.
go back to reference S. Li, L. Da Xu, and S. Zhao, “5G Internet of Things: A Survey,” J. Ind. Inf. Integr., p., 2018. S. Li, L. Da Xu, and S. Zhao, “5G Internet of Things: A Survey,” J. Ind. Inf. Integr., p., 2018.
4.
go back to reference Y.-Y. Teing, D. Ali, K. Choo, M. T. Abdullah, and Z. Muda, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” IEEE Trans. Sustain. Comput., pp. 1–1, 2017. Y.-Y. Teing, D. Ali, K. Choo, M. T. Abdullah, and Z. Muda, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” IEEE Trans. Sustain. Comput., pp. 1–1, 2017.
5.
go back to reference I. Yaqoob et al., “The rise of ransomware and emerging security challenges in the Internet of Things,” Comput. Networks, vol. 129, pp. 444–458, 2017. I. Yaqoob et al., “The rise of ransomware and emerging security challenges in the Internet of Things,” Comput. Networks, vol. 129, pp. 444–458, 2017.
6.
go back to reference A. Azmoodeh, A. Dehghantanha, M. Conti, and K.-K. R. Choo, “Detecting crypto-ransomware in IoT networks based on energy consumption footprint,” J. Ambient Intell. Humaniz. Comput., pp. 1–12, Aug. 2017. A. Azmoodeh, A. Dehghantanha, M. Conti, and K.-K. R. Choo, “Detecting crypto-ransomware in IoT networks based on energy consumption footprint,” J. Ambient Intell. Humaniz. Comput., pp. 1–12, Aug. 2017.
7.
go back to reference D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012. D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012.
8.
go back to reference S. Walker-Roberts, M. Hammoudeh, and A. Dehghantanha, “A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure,” IEEE Access, 2018. S. Walker-Roberts, M. Hammoudeh, and A. Dehghantanha, “A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure,” IEEE Access, 2018.
9.
go back to reference M. Alaa, A. A. Zaidan, B. B. Zaidan, M. Talal, and M. L. M. Kiah, “A review of smart home applications based on Internet of Things,” J. Netw. Comput. Appl., vol. 97, pp. 48–65, 2017. M. Alaa, A. A. Zaidan, B. B. Zaidan, M. Talal, and M. L. M. Kiah, “A review of smart home applications based on Internet of Things,” J. Netw. Comput. Appl., vol. 97, pp. 48–65, 2017.
10.
go back to reference A. Azmoodeh, A. Dehghantanha, and K.-K. R. Choo, “Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning,” IEEE Trans. Sustain. Comput., pp. 1–1, 2018. A. Azmoodeh, A. Dehghantanha, and K.-K. R. Choo, “Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning,” IEEE Trans. Sustain. Comput., pp. 1–1, 2018.
11.
go back to reference S. Watson and A. Dehghantanha, “Digital forensics: the missing piece of the Internet of Things promise,” Comput. Fraud Secur., vol. 2016, no. 6, pp. 5–8, Jun. 2016. S. Watson and A. Dehghantanha, “Digital forensics: the missing piece of the Internet of Things promise,” Comput. Fraud Secur., vol. 2016, no. 6, pp. 5–8, Jun. 2016.
12.
go back to reference H. HaddadPajouh, A. Dehghantanha, R. Khayami, and K.-K. R. Choo, “A Deep Recurrent Neural Network Based Approach for Internet of Things Malware Threat Hunting”, Future Generation Computer System,” Futur. Gener. Comput. Syst., 2017. H. HaddadPajouh, A. Dehghantanha, R. Khayami, and K.-K. R. Choo, “A Deep Recurrent Neural Network Based Approach for Internet of Things Malware Threat Hunting”, Future Generation Computer System,” Futur. Gener. Comput. Syst., 2017.
13.
go back to reference M. Conti, T. Dargahi, and A. Dehghantanha, “Cyber Threat Intelligence: Challenges and Opportunities,” Springer, Cham, 2018, pp. 1–6.CrossRef M. Conti, T. Dargahi, and A. Dehghantanha, “Cyber Threat Intelligence: Challenges and Opportunities,” Springer, Cham, 2018, pp. 1–6.CrossRef
14.
go back to reference M. Hopkins and A. Dehghantanha, “Exploit Kits: The production line of the Cybercrime economy?,” in 2015 2nd International Conference on Information Security and Cyber Forensics, InfoSec 2015, 2016. M. Hopkins and A. Dehghantanha, “Exploit Kits: The production line of the Cybercrime economy?,” in 2015 2nd International Conference on Information Security and Cyber Forensics, InfoSec 2015, 2016.
15.
go back to reference V. Suhendra, “A Survey on Access Control Deployment,” in Security Technology, 2011, pp. 11–20. V. Suhendra, “A Survey on Access Control Deployment,” in Security Technology, 2011, pp. 11–20.
16.
go back to reference D. Kiwia, A. Dehghantanha, K.-K. R. Choo, and J. Slaughter, “A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence,” J. Comput. Sci., Nov. 2017. D. Kiwia, A. Dehghantanha, K.-K. R. Choo, and J. Slaughter, “A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence,” J. Comput. Sci., Nov. 2017.
17.
go back to reference S. Homayoun, A. Dehghantanha, M. Ahmadzadeh, S. Hashemi, and R. Khayami, “Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence,” IEEE Trans. Emerg. Top. Comput., pp. 1–1, 2017. S. Homayoun, A. Dehghantanha, M. Ahmadzadeh, S. Hashemi, and R. Khayami, “Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence,” IEEE Trans. Emerg. Top. Comput., pp. 1–1, 2017.
18.
go back to reference R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Comput. Networks, vol. 57, no. 10, pp. 2266–2279, 2013. R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Comput. Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
19.
go back to reference S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Comput. Networks, vol. 76, pp. 146–164, 2015. S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Comput. Networks, vol. 76, pp. 146–164, 2015.
20.
go back to reference M. R. Abdmeziem and D. Tandjaoui, “An end-to-end secure key management protocol for e-health applications,” Comput. Electr. Eng., vol. 44, pp. 184–197, 2015. M. R. Abdmeziem and D. Tandjaoui, “An end-to-end secure key management protocol for e-health applications,” Comput. Electr. Eng., vol. 44, pp. 184–197, 2015.
21.
go back to reference D. Mishra, A. Gunasekaran, S. J. Childe, T. Papadopoulos, R. Dubey, and S. Wamba, “Vision, applications and future challenges of Internet of Things: A bibliometric study of the recent literature,” Ind. Manag. Data Syst., vol. 116, no. 7, pp. 1331–1355, 2016. D. Mishra, A. Gunasekaran, S. J. Childe, T. Papadopoulos, R. Dubey, and S. Wamba, “Vision, applications and future challenges of Internet of Things: A bibliometric study of the recent literature,” Ind. Manag. Data Syst., vol. 116, no. 7, pp. 1331–1355, 2016.
22.
go back to reference J. Ruiz-Rosero, G. Ramirez-Gonzalez, J. M. Williams, H. Liu, R. Khanna, and G. Pisharody, “Internet of Things: A Scientometric Review,” Symmetry (Basel)., vol. 9, no. 12, 2017. J. Ruiz-Rosero, G. Ramirez-Gonzalez, J. M. Williams, H. Liu, R. Khanna, and G. Pisharody, “Internet of Things: A Scientometric Review,” Symmetry (Basel)., vol. 9, no. 12, 2017.
23.
go back to reference A. Ouaddah, H. Mousannif, A. A. Elkalam, and A. A. Ouahman, “Access control in the Internet of Things: Big challenges and new opportunities,” Comput. Networks, vol. 112, pp. 237–262, 2017. A. Ouaddah, H. Mousannif, A. A. Elkalam, and A. A. Ouahman, “Access control in the Internet of Things: Big challenges and new opportunities,” Comput. Networks, vol. 112, pp. 237–262, 2017.
24.
go back to reference M. F. A. Razak, N. B. Anuar, R. Salleh, and A. Firdaus, “The rise of ‘malware’: Bibliometric analysis of malware study,” J. Netw. Comput. Appl., vol. 75, pp. 58–76, 2016. M. F. A. Razak, N. B. Anuar, R. Salleh, and A. Firdaus, “The rise of ‘malware’: Bibliometric analysis of malware study,” J. Netw. Comput. Appl., vol. 75, pp. 58–76, 2016.
25.
go back to reference J. Baldwin, O. M. K. Alhawi, S. Shaughnessy, A. Akinbi, and A. Dehghantanha, Emerging from the cloud: A bibliometric analysis of cloud forensics studies, vol. 70. 2018. J. Baldwin, O. M. K. Alhawi, S. Shaughnessy, A. Akinbi, and A. Dehghantanha, Emerging from the cloud: A bibliometric analysis of cloud forensics studies, vol. 70. 2018.
26.
go back to reference J. Gill, I. Okere, H. HaddadPajouh, and A. Dehghantanha, Mobile forensics: A bibliometric analysis, vol. 70. 2018. J. Gill, I. Okere, H. HaddadPajouh, and A. Dehghantanha, Mobile forensics: A bibliometric analysis, vol. 70. 2018.
27.
go back to reference M. A. Meyers and H. Quan, “The use of the h-index to evaluate and rank academic departments,” J. Mater. Res. Technol., vol. 6, no. 4, pp. 304–311, Oct. 2017. M. A. Meyers and H. Quan, “The use of the h-index to evaluate and rank academic departments,” J. Mater. Res. Technol., vol. 6, no. 4, pp. 304–311, Oct. 2017.
28.
go back to reference J. L. Hernández-Ramos, M. P. Pawlowski, A. J. Jara, A. F. Skarmeta, and L. Ladid, “Toward a Lightweight Authentication and Authorization Framework for Smart Objects,” IEEE J. Sel. Areas Commun., vol. 33, no. 4, pp. 690–702, 2015. J. L. Hernández-Ramos, M. P. Pawlowski, A. J. Jara, A. F. Skarmeta, and L. Ladid, “Toward a Lightweight Authentication and Authorization Framework for Smart Objects,” IEEE J. Sel. Areas Commun., vol. 33, no. 4, pp. 690–702, 2015.
29.
go back to reference G. Tuna, D. G. Kogias, V. C. Gungor, C. Gezer, E. Taşkın, and E. Ayday, “A survey on information security threats and solutions for Machine to Machine (M2M) communications,” J. Parallel Distrib. Comput., vol. 109, pp. 142–154, 2017. G. Tuna, D. G. Kogias, V. C. Gungor, C. Gezer, E. Taşkın, and E. Ayday, “A survey on information security threats and solutions for Machine to Machine (M2M) communications,” J. Parallel Distrib. Comput., vol. 109, pp. 142–154, 2017.
30.
go back to reference R. Mayrhofer and H. Gellersen, “Spontaneous mobile device authentication based on sensor data,” Inf. Secur. Tech. Rep., vol. 13, no. 3, pp. 136–150, 2008. R. Mayrhofer and H. Gellersen, “Spontaneous mobile device authentication based on sensor data,” Inf. Secur. Tech. Rep., vol. 13, no. 3, pp. 136–150, 2008.
31.
go back to reference C. Lai, H. Li, R. Lu, and X. (Sherman) Shen, “SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks,” Comput. Networks, vol. 57, no. 17, pp. 3492–3510, 2013. C. Lai, H. Li, R. Lu, and X. (Sherman) Shen, “SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks,” Comput. Networks, vol. 57, no. 17, pp. 3492–3510, 2013.
32.
go back to reference K. Grover and A. Lim, “A survey of broadcast authentication schemes for wireless networks,” Ad Hoc Networks, vol. 24, pp. 288–316, 2015. K. Grover and A. Lim, “A survey of broadcast authentication schemes for wireless networks,” Ad Hoc Networks, vol. 24, pp. 288–316, 2015.
33.
go back to reference N. Ruan and Y. Hori, “DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things,” in 2012 International Conference on Selected Topics in Mobile and Wireless Networking, 2012, pp. 60–65. N. Ruan and Y. Hori, “DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things,” in 2012 International Conference on Selected Topics in Mobile and Wireless Networking, 2012, pp. 60–65.
34.
go back to reference S. Kosunalp, Y. Chu, P. D. Mitchell, D. Grace, and T. Clarke, “Use of Q-learning approaches for practical medium access control in wireless sensor networks,” Eng. Appl. Artif. Intell., vol. 55, pp. 146–154, 2016. S. Kosunalp, Y. Chu, P. D. Mitchell, D. Grace, and T. Clarke, “Use of Q-learning approaches for practical medium access control in wireless sensor networks,” Eng. Appl. Artif. Intell., vol. 55, pp. 146–154, 2016.
35.
go back to reference H. S. G. Pussewalage and V. A. Oleshchuk, “Attribute based access control scheme with controlled access delegation for collaborative E-health environments,” J. Inf. Secur. Appl., vol. 37, pp. 50–64, 2017. H. S. G. Pussewalage and V. A. Oleshchuk, “Attribute based access control scheme with controlled access delegation for collaborative E-health environments,” J. Inf. Secur. Appl., vol. 37, pp. 50–64, 2017.
36.
go back to reference N. Khalil, M. R. Abid, D. Benhaddou, and M. Gerndt, “Wireless sensors networks for Internet of Things,” in 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014, pp. 1–6. N. Khalil, M. R. Abid, D. Benhaddou, and M. Gerndt, “Wireless sensors networks for Internet of Things,” in 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014, pp. 1–6.
37.
go back to reference Y. Duroc and S. Tedjini, “RFID: A key technology for Humanity,” Comptes Rendus Phys., vol. 19, no. 1, pp. 64–71, 2018. Y. Duroc and S. Tedjini, “RFID: A key technology for Humanity,” Comptes Rendus Phys., vol. 19, no. 1, pp. 64–71, 2018.
38.
go back to reference J. V. V Sobral et al., “A framework for enhancing the performance of Internet of Things applications based on RFID and WSNs,” J. Netw. Comput. Appl., vol. 107, pp. 56–68, 2018. J. V. V Sobral et al., “A framework for enhancing the performance of Internet of Things applications based on RFID and WSNs,” J. Netw. Comput. Appl., vol. 107, pp. 56–68, 2018.
39.
go back to reference B. J. Mohd, T. Hayajneh, K. M. A. Yousef, Z. A. Khalaf, and M. Z. A. Bhuiyan, “Hardware design and modeling of lightweight block ciphers for secure communications,” Futur. Gener. Comput. Syst., vol. 83, pp. 510–521, 2018. B. J. Mohd, T. Hayajneh, K. M. A. Yousef, Z. A. Khalaf, and M. Z. A. Bhuiyan, “Hardware design and modeling of lightweight block ciphers for secure communications,” Futur. Gener. Comput. Syst., vol. 83, pp. 510–521, 2018.
40.
go back to reference K. Mahmood, S. A. Chaudhry, H. Naqvi, S. Kumari, X. Li, and A. K. Sangaiah, “An elliptic curve cryptography based lightweight authentication scheme for smart grid communication,” Futur. Gener. Comput. Syst., vol. 81, pp. 557–565, 2018. K. Mahmood, S. A. Chaudhry, H. Naqvi, S. Kumari, X. Li, and A. K. Sangaiah, “An elliptic curve cryptography based lightweight authentication scheme for smart grid communication,” Futur. Gener. Comput. Syst., vol. 81, pp. 557–565, 2018.
41.
go back to reference M. Gentili, R. Sannino, and M. Petracca, “BlueVoice: Voice communications over Bluetooth Low Energy in the Internet of Things scenario,” Comput. Commun., vol. 89–90, pp. 51–59, 2016. M. Gentili, R. Sannino, and M. Petracca, “BlueVoice: Voice communications over Bluetooth Low Energy in the Internet of Things scenario,” Comput. Commun., vol. 89–90, pp. 51–59, 2016.
42.
go back to reference K. B. Raja, R. Raghavendra, M. Stokkenes, and C. Busch, “Multi-modal authentication system for smartphones using face, iris and periocular,” in 2015 International Conference on Biometrics (ICB), 2015, pp. 143–150. K. B. Raja, R. Raghavendra, M. Stokkenes, and C. Busch, “Multi-modal authentication system for smartphones using face, iris and periocular,” in 2015 International Conference on Biometrics (ICB), 2015, pp. 143–150.
43.
go back to reference Y. Liu, B. Dong, B. Guo, J. Yang, and W. Peng, “Combination of Cloud Computing and Internet of Things (IOT) in Medical Monitoring Systems,” Int. J. Hybrid Inf. Technol., vol. 8, no. 12, pp. 367–376, 2015. Y. Liu, B. Dong, B. Guo, J. Yang, and W. Peng, “Combination of Cloud Computing and Internet of Things (IOT) in Medical Monitoring Systems,” Int. J. Hybrid Inf. Technol., vol. 8, no. 12, pp. 367–376, 2015.
44.
go back to reference C. Dores, L. P. Reis, and N. V Lopes, “Internet of things and cloud computing,” in 2014 9th Iberian Conference on Information Systems and Technologies (CISTI), 2014, pp. 1–4. C. Dores, L. P. Reis, and N. V Lopes, “Internet of things and cloud computing,” in 2014 9th Iberian Conference on Information Systems and Technologies (CISTI), 2014, pp. 1–4.
45.
go back to reference J. A. Guerrero-ibanez, S. Zeadally, and J. Contreras-Castillo, “Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies,” IEEE Wirel. Commun., vol. 22, no. 6, pp. 122–128, 2015. J. A. Guerrero-ibanez, S. Zeadally, and J. Contreras-Castillo, “Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies,” IEEE Wirel. Commun., vol. 22, no. 6, pp. 122–128, 2015.
46.
go back to reference F. Lauria, “How to footprint, report and remotely secure compromised IoT devices,” Netw. Secur., no. December 2017, pp. 10–16, Dec. 2017. F. Lauria, “How to footprint, report and remotely secure compromised IoT devices,” Netw. Secur., no. December 2017, pp. 10–16, Dec. 2017.
47.
go back to reference G. Roussos and V. Kostakos, “rfid in pervasive computing: State-of-the-art and outlook,” Pervasive Mob. Comput., vol. 5, no. 1, pp. 110–131, 2009. G. Roussos and V. Kostakos, “rfid in pervasive computing: State-of-the-art and outlook,” Pervasive Mob. Comput., vol. 5, no. 1, pp. 110–131, 2009.
48.
go back to reference M. Turkanović, B. Brumen, and M. Hölbl, “A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion,” Ad Hoc Networks, vol. 20, pp. 96–112, 2014. M. Turkanović, B. Brumen, and M. Hölbl, “A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion,” Ad Hoc Networks, vol. 20, pp. 96–112, 2014.
49.
go back to reference P. P. Ray, “A survey on Internet of Things architectures,” J. King Saud Univ. - Comput. Inf. Sci., 2016. P. P. Ray, “A survey on Internet of Things architectures,” J. King Saud Univ. - Comput. Inf. Sci., 2016.
50.
go back to reference J. Lopez, R. Rios, F. Bao, and G. Wang, “Evolving privacy: From sensors to the Internet of Things,” Futur. Gener. Comput. Syst., vol. 75, pp. 46–57, 2017. J. Lopez, R. Rios, F. Bao, and G. Wang, “Evolving privacy: From sensors to the Internet of Things,” Futur. Gener. Comput. Syst., vol. 75, pp. 46–57, 2017.
51.
go back to reference A. Shalaginov, S. Banin, A. Dehghantanha, and K. Franke, Machine learning aided static malware analysis: A survey and tutorial, vol. 70. 2018. A. Shalaginov, S. Banin, A. Dehghantanha, and K. Franke, Machine learning aided static malware analysis: A survey and tutorial, vol. 70. 2018.
52.
go back to reference H. H. Pajouh, A. Dehghantanha, R. Khayami, and K.-K. R. Choo, “Intelligent OS X malware threat detection with code inspection,” J. Comput. Virol. Hacking Tech., 2017. H. H. Pajouh, A. Dehghantanha, R. Khayami, and K.-K. R. Choo, “Intelligent OS X malware threat detection with code inspection,” J. Comput. Virol. Hacking Tech., 2017.
53.
go back to reference N. Milosevic, A. Dehghantanha, and K.-K. R. Choo, “Machine learning aided Android malware classification,” Comput. Electr. Eng. N. Milosevic, A. Dehghantanha, and K.-K. R. Choo, “Machine learning aided Android malware classification,” Comput. Electr. Eng.
54.
go back to reference Y.-Y. Teing, A. Dehghantanha, K. K. R. Choo, and L. T. Yang, “Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study,” Comput. Electr. Eng., 2016. Y.-Y. Teing, A. Dehghantanha, K. K. R. Choo, and L. T. Yang, “Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study,” Comput. Electr. Eng., 2016.
55.
go back to reference Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, T. Dargahi, and M. Conti, “Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study,” J. Forensic Sci., vol. 62, no. 3, pp. 641–654, May 2017. Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, T. Dargahi, and M. Conti, “Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study,” J. Forensic Sci., vol. 62, no. 3, pp. 641–654, May 2017.
56.
go back to reference O. Osanaiye, H. Cai, K.-K. R. Choo, A. Dehghantanha, Z. Xu, and M. Dlodlo, “Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing,” Eurasip J. Wirel. Commun. Netw., vol. 2016, no. 1, 2016. O. Osanaiye, H. Cai, K.-K. R. Choo, A. Dehghantanha, Z. Xu, and M. Dlodlo, “Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing,” Eurasip J. Wirel. Commun. Netw., vol. 2016, no. 1, 2016.
57.
go back to reference S. Homayoun, M. Ahmadzadeh, S. Hashemi, A. Dehghantanha, and R. Khayami, BoTShark: A deep learning approach for botnet traffic detection, vol. 70. 2018. S. Homayoun, M. Ahmadzadeh, S. Hashemi, A. Dehghantanha, and R. Khayami, BoTShark: A deep learning approach for botnet traffic detection, vol. 70. 2018.
58.
go back to reference A. D. James Baldwin, Omar Alhawi, Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection. Cyber Threat Intelligence- Springer Book, 2017. A. D. James Baldwin, Omar Alhawi, Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection. Cyber Threat Intelligence- Springer Book, 2017.
Metadata
Title
A Bibliometric Analysis of Authentication and Access Control in IoT Devices
Authors
Samuel Grooby
Tooska Dargahi
Ali Dehghantanha
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-10543-3_3

Premium Partner