In the context of vertical industry, security demands could vary significantly among services. For instance, the mobile Internet of Things (IoT) devices requires lightweight security while high-speed mobile services demand high efficient mobile security. The network-based hop-by-hop security approach may not be efficient enough to build differentiated end-to-end (E2E) security for different services. As IoT is gaining momentum, more people will be able to remotely operate or "talk" to networked devices, for instance, instructing facilities at a smart home to get up. Therefore, there is a need for more stringent authentication method to prevent unauthorized access to IoT devices.

Now, what are the permanent authentication methods the could be to prevent unauthorized access to IoT devices?

More Musah Shaibu's questions See All
Similar questions and discussions