Abstract

The Internet of Things (IoT) is a modern computing model that refers to interconnected physical devices or IoT devices containing sensors, actuators and networking, so that these IoT devices can link, communicate and share data. With the rise in the number of IoT devices, several security concerns have been found, especially in the sharing of sensitive data. Authentication is one of these reliability concerns. In the IoT world, authentication is a major challenge due to the complexity of protocols, devices and topologies. IoT systems interacting with each other need to be trustworthy in order to prevent various forms of security negligence attacks. Authentication is also the cornerstone of access management and transparency. The new authentication system is no longer ideal for IoT applications. They need to be updated in order to take into account the drawbacks of these device functions, such as limited memory and storage and poor processing power. This article focuses primarily on the analysis and evaluation of some of the newest authentication solutions suggested for the IoT environment. There are 35 authentication protocol are analysed and presented at one place with their applications.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call