Abstract

Internet of things (IoT) is considered as a collection of heterogeneous devices, such as sensors, Radio-frequency identification (RFID) and actuators, which form a huge network, enabling non-internet components in the network to produce a better world of services, like smart home, smart city, smart transportation, and smart industries. On the other hand, security and privacy are the most important aspects of the IoT network, which includes authentication, authorization, data protection, network security, and access control. Additionally, traditional network security cannot be directly used in IoT networks due to its limitations on computational capabilities and storage capacities. Furthermore, authentication is the mainstay of the IoT network, as all components undergo an authentication process before establishing communication. Therefore, securing authentication is essential. In this paper, we have focused on IoT security particularly on their authentication mechanisms. Consequently, we highlighted enormous attacks and technical methods on the IoT authentication mechanism. Additionally, we discussed existing security verification techniques and evaluation schemes of IoT authentication. Furthermore, analysis against current existing protocols have been discussed in all parts and provided some recommendation. Finally, the aim of our study is to help the future researcher by providing security issues, open challenges and future scopes in IoT authentication.

Highlights

  • It has been anticipated that all the things in the world are going to be internetworked [1]

  • TECHNICAL METHODS OF AUTHENTICATION MECHANISM IN Internet of things (IoT) As authentication is a process of validating users and components identity, so that the authorization process can provide access to the network or an information system, which should be highly secured from vulnerable threats

  • As it is predicted that the number of connected devices in the world will take over the headcount of human beings soon, which can be possible because of the expansion of the Internet of Things

Read more

Summary

Introduction

It has been anticipated that all the things in the world are going to be internetworked [1]. Internet-based services, which is a global network, are connections of computers and computing devices. IoT is not based on only at home and in businesses like manufacturing organizations, vehicular networks, industries, grid companies, health. All the things around the world will be fitted with embedded electronics and information technology so that it can produce valuable information based on the requirements and can work like important nodes of the network. With the help of embedded electronics, embedded systems, embedded processors and embedded communication systems such small elements of environments can be connected to the network, depending on the applications and business requirements, to produce a huge internetworking environment, which is incomparable to the current network size. It is stated that more than 20.5 billion IoT devices will

Objectives
Methods
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call