Current research on Internet of Things (IoT) security protocols: A survey

被引:0
|
作者
Mishra, Raghavendra [1 ]
Mishra, Ankita [2 ]
机构
[1] VIT Bhopal Univ, Sch Comp Sci Engn & Artificial Intelligence SCAI, Sehore 466114, Madhya Pradesh, India
[2] Govt Motilal Vigyan Mahavidyalaya, Dept Math, Bhopal 462008, India
关键词
Wireless sensor networks; Sensor node; User authentication; IoT security challenges; KEY AGREEMENT SCHEME; USER AUTHENTICATION; NETWORKS; DEVICES;
D O I
10.1016/j.cose.2024.104310
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) has become indispensable for remote monitoring, integrating diverse hardware and software elements to provide seamless, secure, and reliable services. Essential components like network protocols, sensor nodes, actuators, and gateway nodes ensure the functionality and security of these systems. However, the increasing proliferation of IoT devices has raised significant security concerns, particularly regarding user privacy, data integrity, and service availability. This manuscript presents a comprehensive review of existing authenticated key exchange mechanisms for IoT security, focusing on the limitations of current authentication and key agreement methods. We examine relevant schemes for the case study to explore key security challenges. In this regard, we conduct a cryptanalysis of three recently proposed IoT security protocols, evaluating their effectiveness in addressing vulnerabilities. The key contribution of this work lies in offering insights into the latest advancements in IoT security, identifying critical weaknesses, and proposing enhancements to improve the resilience of IoT systems in an increasingly interconnected world.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Security and Privacy Issues in Internet of Things (IoT)
    Masood, Muhammad Sarmad
    Bajaj, Kamini
    Rajab, Mohamad Michael
    2018 4TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2018,
  • [42] Security and privacy Aspects for Internet of Things (IoT)
    Bansal, Malti
    Nanda, Marshal
    Husain, Md Nazir
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 199 - 204
  • [43] An Internet of Things (IoT) Security Assessment for Households
    Aiken, William
    Ryoo, Jungwoo
    Rizvi, Syed
    2020 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2020), 2020, : 53 - 59
  • [44] Internet of Things (IoT): Security and Privacy Threats
    Shaikh, Eman
    Mohiuddin, Iman
    Manzoor, Ayisha
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [45] A Review of Security Machanism in internet of Things(IoT)
    Khursheeed, Faizan
    Sami-Ud-din, M.
    Sumra, Irshad Ahmed
    Safder, Muhammad
    2020 3RD INTERNATIONAL CONFERENCE ON ADVANCEMENTS IN COMPUTATIONAL SCIENCES (ICACS), 2020,
  • [46] Multicast Routing Protocols for Internet of Things (IoT) Applications
    Gadekar, Prakash Ramesh
    Verma, Avnish Raj
    Dhotre, Virendrakumar A.
    TECHNO-SOCIETAL 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SOCIETAL APPLICATIONS - VOL 2, 2020, : 99 - 106
  • [47] Security Attacks and Secure Routing Protocols in RPL-based Internet of Things: Survey
    Kamble, Arvind
    Malemath, Virendra S.
    Patil, Deepika
    2017 INTERNATIONAL CONFERENCE ON EMERGING TRENDS & INNOVATION IN ICT (ICEI), 2017, : 33 - 39
  • [48] A survey on privacy and security of Internet of Things
    Ogonji, Mark Mbock
    Okeyo, George
    Wafula, Joseph Muliaro
    COMPUTER SCIENCE REVIEW, 2020, 38
  • [49] A Survey on Security Concerns in Internet of Things
    Kaur, Bhavkanwal
    Pateriya, Pushpendra Kumar
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 27 - 34
  • [50] A Survey of Application Layer Protocols of Internet of Things
    Bibi, Nawab
    Iqbal, Faiza
    Akhtar, Salwa Muhammad
    Anwar, Rabia
    Bibi, Shamshad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (11): : 301 - 311