Abstract

Internet of things (IoT) has become an integral part of our daily life. However, this technology exposes many security concerns. With the increasing focus on security and privacy, IoT device authentication becomes a crucial requirement to protect devices against any unauthorised access. Although static authentication ensures the legitimacy of the user or device at the beginning of each session, it does not account for session hijacking that could occur after the initial authentication. Continuous authentication is a more robust authentication technique to ensure security throughout the session. Also, it ensures fast authentication for frequent messages sent during the session. In this research, we analyse the security threats in the context of device-to-device communication. We elaborate on the main authentication requirements for IoT. Additionally, we survey major contributions in authentication and compare them based on the predefined requirements. We believe that the findings of this paper provide valuable information to researchers by presenting new directions for future research.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.