A Systematic Security Assessment and Review of Internet of Things in the Context of Authentication

被引:10
|
作者
Saqib, Manasha [1 ]
Moon, Ayaz Hassan [1 ]
机构
[1] Islamic Univ Sci & Technol, Sch Engn & Technol, Kashmir, India
关键词
Internet of Things (IoT); Systematic literature review; Security; Authentication; KEY AGREEMENT SCHEME; WIRELESS SENSOR NETWORKS; USER AUTHENTICATION; MUTUAL AUTHENTICATION; PROVABLY SECURE; IOT; PROTOCOL; EFFICIENT; PRIVACY; TRUST;
D O I
10.1016/j.cose.2022.103053
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is emerging globally as an intriguing trend expected to connect 15 billion devices by the end of 2022. Its ability to bring intelligence and automation to various application domains provides a plethora of opportunities while posing severe security challenges. Lack of proper authentication has been attributed to data disclosure's perils over wireless communication channels. Therefore, authentication as an essential security tenet continues to be a highly researched area, especially in resource constraint networks like IoT and IIoT. This paper constructs a comprehensive systematic literature review to identify and synthesize security issues in IoT from the perspective of authentication mechanisms. Initially, the prevalent security and privacy issues are identified, followed by the explanation of security threats across various layers of the IoT architecture. Additionally, the countermeasures available for addressing security issues are also covered. The highlight of the review is to present a literature review of various authentication mechanisms and different formal security evaluations holistically required for IoT authentication. Moreover, a comparative analysis of some of the popular existing authentication mechanisms designed for the IoT in terms of various performance parameters like computational, communication overhead, and energy consumption has also been covered. Finally, the paper discusses the typical methods for assessing network security and network simulator tools used to evaluate the performance parameters of authentication schemes. This review paper attempts to assist researchers in identifying the existing research gaps in various forms of authentication employed in a typical resource constraint network like IoT that would lead them to develop new solutions. The protocol provided by Kitchenham and Charters has been used to perform this Systematic Literature Review. (c) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] Review on Security of Internet of Things Authentication Mechanism
    Nandy, Tarak
    Bin Idris, Mohd Yamani Idna
    Noor, Rafidah Md
    Kiah, Miss Laiha Mat
    Lun, Lau Sian
    Juma'at, Nor Badrul Annuar
    Ahmedy, Ismail
    Ghani, Norjihan Abdul
    Bhattacharyya, Sananda
    [J]. IEEE ACCESS, 2019, 7 : 151054 - 151089
  • [2] Systematic Review of Authentication and Authorization Advancements for the Internet of Things
    Trnka, Michal
    Abdelfattah, Amr S.
    Shrestha, Aishwarya
    Coffey, Michael
    Cerny, Tomas
    [J]. SENSORS, 2022, 22 (04)
  • [3] Internet of Flying Things security: A systematic review
    Jameii, Seyed Mahdi
    Zamirnaddafi, Romina Sadat
    Rezabakhsh, Reza
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (24):
  • [4] Authentication and Context Awareness Access Control in Internet of Things: A Review
    Kaur, Amritpal
    Isha
    Rai, Gaurav
    Malik, Arun
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 630 - 635
  • [5] Multidomain security authentication for the Internet of things
    Zhang, Qikun
    Zhao, Kunyuan
    Kuang, Xiaohui
    Li, Yongjiao
    Zheng, Yuanpan
    Yuan, Junling
    Wang, Ruifang
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16):
  • [6] A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices
    Kavianpour, Sanaz
    Shanmugam, Bharanidharan
    Azam, Sami
    Zamani, Mazdak
    Samy, Ganthan Narayana
    De Boer, Friso
    [J]. JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2019, 2019
  • [7] Security Analysis of the Internet of Things: A Systematic Literature Review
    Martinez, Juan
    Mejia, Jezreel
    Munoz, Mirna
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SOFTWARE PROCESS IMPROVEMENT (CIMPS 2016): APPLICATIONS IN SOFTWARE ENGINEERING, 2016,
  • [8] On the Security Aspects of Internet of Things: A Systematic Literature Review
    Macedo, Evandro L. C.
    de Oliveira, Egberto A. R.
    Silva, Fabio H.
    Mello Jr, Rui R.
    Franca, Felipe M. G.
    Delicato, Flavia C.
    de Rezende, Jose F.
    de Moraes, Luis F. M.
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2019, 21 (05) : 444 - 457
  • [9] A Systematic Review of Information Security Frameworks in the Internet of Things
    Irshad, Mohammad
    [J]. PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 1270 - 1275
  • [10] Exploring Security and Authentication Issues in Internet of Things
    Prathibha, L.
    Fatima, Kaleem
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2018, : 673 - 678