Current research on Internet of Things (IoT) security protocols: A survey

被引:0
|
作者
Mishra, Raghavendra [1 ]
Mishra, Ankita [2 ]
机构
[1] VIT Bhopal Univ, Sch Comp Sci Engn & Artificial Intelligence SCAI, Sehore 466114, Madhya Pradesh, India
[2] Govt Motilal Vigyan Mahavidyalaya, Dept Math, Bhopal 462008, India
关键词
Wireless sensor networks; Sensor node; User authentication; IoT security challenges; KEY AGREEMENT SCHEME; USER AUTHENTICATION; NETWORKS; DEVICES;
D O I
10.1016/j.cose.2024.104310
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has become indispensable for remote monitoring, integrating diverse hardware and software elements to provide seamless, secure, and reliable services. Essential components like network protocols, sensor nodes, actuators, and gateway nodes ensure the functionality and security of these systems. However, the increasing proliferation of IoT devices has raised significant security concerns, particularly regarding user privacy, data integrity, and service availability. This manuscript presents a comprehensive review of existing authenticated key exchange mechanisms for IoT security, focusing on the limitations of current authentication and key agreement methods. We examine relevant schemes for the case study to explore key security challenges. In this regard, we conduct a cryptanalysis of three recently proposed IoT security protocols, evaluating their effectiveness in addressing vulnerabilities. The key contribution of this work lies in offering insights into the latest advancements in IoT security, identifying critical weaknesses, and proposing enhancements to improve the resilience of IoT systems in an increasingly interconnected world.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Current research on Internet of Things (IoT) security: A survey
    Noor, Mardiana Binti Mohamad
    Hassan, Wan Haslina
    COMPUTER NETWORKS, 2019, 148 : 283 - 294
  • [2] Security Protocols for Internet of Things: A Survey
    Deshmukh, Snehal
    Sonavane, S. S.
    2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 71 - 74
  • [3] Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
    Granjal, Jorge
    Monteiro, Edmundo
    Silva, Jorge Sa
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03): : 1294 - 1312
  • [4] Internet of Things: A survey on the security of IoT frameworks
    Ammar, Mahmoud
    Russello, Giovanni
    Crispo, Bruno
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 : 8 - 27
  • [5] Security for the internet of things: a survey of existing mechanisms, protocols and open research issues
    Gormus, Sedat
    Aydin, Hakan
    Ulutas, Guzin
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2018, 33 (04): : 1247 - 1272
  • [6] Security in the Internet of Things: A Survey on Application Layer Protocols
    Nastase, Lavinia
    2017 21ST INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS), 2017, : 659 - 666
  • [7] SURVEY ON INTERNET OF THINGS (IOT) SECURITY ISSUES & SOLUTIONS
    Kamble, Ashvini
    Bhutad, Sonali
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, : 307 - 312
  • [8] Security in the Internet of Things (IoT)
    Ahmed, Israr
    Saleel, A. P.
    Beheshti, Babak
    Khan, Zahoor Ali
    Ahmad, Imtiaz
    2017 FOURTH HCT INFORMATION TECHNOLOGY TRENDS (ITT), 2017, : 84 - 90
  • [9] Internet of Things (IoT) Security
    Kulkarni, Shivaji
    Durg, Shrihari
    Iyer, Nalini
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 821 - 824
  • [10] Routing Protocols for Mobile Internet of Things (IoT): A Survey on Challenges and Solutions
    Shah, Zawar
    Levula, Andrew
    Khurshid, Khawar
    Ahmed, Jawad
    Ullah, Imdad
    Singh, Sushmita
    ELECTRONICS, 2021, 10 (19)