ABSTRACT

The authentication methods for the Internet of Things (IoT). There is a variety of methods implemented in the software industry but not all are based on the concepts of IoT. This chapter explores several gaps present in the IoT which are further dealt with to provide more and more feasible options pertaining to user authentication. The rapid increase in the number of IoT devices is the main reason for the concern of efficiency of present authentication methods. The chapter focuses on various techniques in authentication and access control in IoT for high-security processes. Narrow Band IoT provides limited resources, data-centric and closely related applications, topology changes dynamically, and complex network environment that can be broadly used in smart agriculture, intelligent parking, remote meter reading, asset tracking, and so on. Authentication enforces access control, and the work is based on facial recognition authentication which is based on deep learning. In this research project, the authors propose on using Convolutional Neural Networks.