Abstract

Internet of Things (IoT) has become one of the most significant technologies in recent years because of possessing the diverse application domains. The variety of applications results in a large amount of users’ private information diffusion that will pose a paramount security concern. User authentication is a significant factor in the IoT environment as it allows the user to communicate with the device securely. Integration of authentication technologies with IoT ensures secure data retrieval and robust access control. This paper provides a comprehensive systematic literature review of various authentication mechanisms for IoT security proposed in the literature. With the comparison of existing authentication mechanisms that are developed for the IoT in terms of security via a multicriteria classification, the open issues that require further research are identified.

Highlights

  • Internet of ings (IoT) is a new paradigm where everyday objects are interconnected and communicate with each other over the Internet [1]

  • The result of our SLR is formulated. e results focus the set answers to the questions taken as bottom-line of our systematic literature review

  • Our findings demonstrate that various types of solutions have been proposed to address the secure authentication scheme for IoT

Read more

Summary

Introduction

Internet of ings (IoT) is a new paradigm where everyday objects are interconnected and communicate with each other over the Internet [1]. IoT facilitates a direct integration of physical objects with the cyber world through smart sensors, RFID tags, smartphones, and wearable devices [2]. E security and privacy of these devices are the most notable challenges in IoT [6]. The number of devices revealed to the public network are increasing gradually and the devices have direct interaction with the physical world to gather data. All these make them a suitable target for malicious users. As IoT devices are built on various technologies such as power management and sensors, their security requirements vary from one application to another.

Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call