Читать книгу Integration of Cloud Computing with Internet of Things - Группа авторов - Страница 44

2.7 Securing IoT 2.7.1 Ensure User Authentication

Оглавление

This objective explores how authentication mechanisms must be established to enhance IoT security. Inherently ambiguous, yet weak verification mechanisms such as passwords. Two-factor authentication hardware tokens are usually best suited to IoT authentication. To order to enhance system security, 2FA based protection frames are now introduced. The enhanced use of biometrics often demonstrates the IoT client’s identification by means of a robust and identifying tool. You can replicate your password or hardware key, but with your downward reader, you can not replicate your fingerprint. The principles and the legal responsibility for social networking sites are also assured of the authentication process Figure 2.6.

Integration of Cloud Computing with Internet of Things

Подняться наверх