Abstract

The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental first step for researchers and developers addressing this domain.

Highlights

  • The Internet of Things (IoT)-related security issues are becoming more alarming given the ubiquitousness of IoT devices and their adoption in critical applications, which aggravate the impact of any security breach to the extent of being life-threatening

  • This paper presents a general overview of the security concerns and requirements in the IoT

  • The authors of [133] proposed a new authentication scheme for mobile phone users based on behavioural pattern. They started by collecting the behavior of mobile phone user regarding the applications used in a specific time and the duration of usage, and they change these data to a unique pattern to be used as an authentication between the user and the mobile phone.The proposed scheme will be used as complementary to the existing authentication schemes provided by mobile phones

Read more

Summary

Introduction

The number of connected devices is growing exponentially, forming the so-called Internet of Things (IoT), a large network of networks connecting smart devices such as sensors and actuators. At the same time from being exploited to become an attack tool (e.g., Mirai botnet [5,6]) These challenges are “augmented” with the resource-limited nature of IoT devices which renders traditional communication protocols and security schemes inefficient and even infeasible for IoT. Cryptographic schemes designed for main-powered, high processing and/or large memory devices do not “suit” the resource-limited IoT nodes This led to the emergence of lightweight authentication schemes; some of them are specific to the context of IoT or to the Wireless. This paper presents a general overview of the security concerns and requirements in the IoT environment in a layer-based approach It provides an up-to-date survey of the different IoT authentication schemes.

IoT Generic Architecture
Security Services
Perception Layer Security Issues and Requirements
Network Layer Security Issues and Requirements
Application Layer Security Issues and Requirements
Taxonomy of IoT Authentication Schemes
Procedure
Authentication procedure
Analysis of IoT Authentication Schemes
Smart Grids
RFID and NFC-Based Applications
Vehicular Networks
Smart Homes
Wireless Sensor Networks
Mobile Network and Applications
Generic IoT Applications
Related Works
Findings
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call