4.8 Article

Seamless Authentication: For IoT-Big Data Technologies in Smart Industrial Application Systems

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 17, Issue 4, Pages 2919-2927

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2020.2990741

Keywords

Big data; communication overhead; computation; computing performance; Internet of Things (IoT); seamless authentication

Funding

  1. Vellore Institute of Technology, Vellore, India

Ask authors/readers for more resources

Technological advancements have enabled the connectivity of Internet devices for data observation and measurement of physical entities, with a focus on transforming raw data into smart data for better decision-making processes and privacy protection. This transformation plays a crucial role in improving user experience and device access.
Technological developments in communication technologies in the form of hardware and software have made unilateral sensor connectivity over Internet access that facilitates data observation and measurement of physical entities. A technology known as Internet of Things (IoT) is commonly referred to as the connectivity of Internet devices that provides the communication interactivity between the physical and the cyber objects. One of the key objectives of Internet computing is to simplify human activities and improve the user experience and device access. To explore its basic challenges, big data is somehow diversified into smart-data intelligence that transforms the raw semantic data into smart-data. The transformation approaches realize the significance of productivity and financial gain, which in turn offers a better decision-making process and privacy preservation. Moreover, the intelligent system collects raw data from different devices that analyze the extracted information. Since IoT plays a significant role in the development of a new source dataset, a seamless authentication protocol (SAP) is preferably chosen to coalesce data inference, algorithm development, and technological advancement. The comparative analysis proves that the proposed SAP consumes less computation and communication overhead as compared to other authentication schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available