A machine learning based authentication and intrusion detection scheme for IoT users anonymity preservation in fog environment.

Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users ar...

Full description

Saved in:
Bibliographic Details
Main Authors: Khondokar Oliullah, Md Whaiduzzaman, Md Julkar Nayeen Mahi, Tony Jan, Alistair Barros
Format: Article
Language:English
Published: Public Library of Science (PLoS) 2025-01-01
Series:PLoS ONE
Online Access:https://doi.org/10.1371/journal.pone.0323954
Tags: Add Tag
No Tags, Be the first to tag this record!