A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

被引:25
|
作者
Rao, Patruni Muralidhara [1 ]
Deebak, B. D. [1 ,2 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, India
[2] Gachon Univ, Dept Comp Engn, Seongnam 13120, South Korea
关键词
Security and privacy; Authentication; Key-management; Internet of things; Network Models; WIRELESS SENSOR NETWORKS; 2-FACTOR USER AUTHENTICATION; EFFICIENT MUTUAL AUTHENTICATION; AGREEMENT SCHEME; LIGHTWEIGHT AUTHENTICATION; 3-FACTOR AUTHENTICATION; PRIVACY PRESERVATION; INTRUSION DETECTION; IOT; PROTOCOL;
D O I
10.1016/j.adhoc.2023.103159
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical infrastructures such as healthcare, intelligent transportation, and home automation adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The latest development in sensory and communication technologies collaborate directly with modern applications to bridge networking services without human intervention. Most information systems enable the extension of digital technology to demonstrate the potential use of next-generation network services and management. However, recent advancements open various opportunities, including repudiation, data tampering, and security threats in digital security and privacy. Thus, this survey article chooses a systematic literature review to present a comprehensive survey on authentication and key management in IoT. To discuss the major issues involved in IoT environments, this survey categorizes the work progress into four modules: 1. Discuss the broad aspects of convergence technologies, including healthcare, smart farming, intelligent transportation, etc., to address challenges such as security and privacy in IoT; 2. Conduct a comprehensive review of state-of-the-art technologies to identify security requirements, services, and challenges associated with modern IoT applications; 3. Present a systematic approach to review various key agreement schemes based on network models and performance analysis to examine potential vulnerabilities. 4. Show a thematic analysis to determine suitable corrective measurements dealing with various security and privacy issues. Finally, this paper rationalizes significant progress, including research challenges and future directions in IoT to promote new insights.
引用
收藏
页数:31
相关论文
共 50 条
  • [11] On the role of machine learning in satellite internet of things: A survey of techniques, challenges, and future directions
    Choquenaira-Florez, Alexander Y.
    Fraire, Juan A.
    Pasandi, Hannah B.
    Rivano, Herve
    COMPUTER NETWORKS, 2025, 259
  • [12] A comprehensive survey of authentication methods in Internet-of-Things and its
    Kumar, Ashish
    Saha, Rahul
    Conti, Mauro
    Kumar, Gulshan
    Buchanan, William J.
    Kim, Tai Hoon
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 204
  • [13] A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
    Hasan, Mohammad Kamrul
    Zhou, Weichen
    Safie, Nurhizam
    Ahmed, Fatima Rayan Awad
    Ghazal, Taher M.
    IEEE ACCESS, 2024, 12 : 61642 - 61666
  • [14] A secure authentication scheme for Internet of Things
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    PERVASIVE AND MOBILE COMPUTING, 2017, 42 : 15 - 26
  • [15] Challenges and future directions of secure federated learning: a survey
    Kaiyue Zhang
    Xuan Song
    Chenhan Zhang
    Shui Yu
    Frontiers of Computer Science, 2022, 16
  • [16] Challenges and future directions of secure federated learning:a survey
    Kaiyue ZHANG
    Xuan SONG
    Chenhan ZHANG
    Shui YU
    Frontiers of Computer Science, 2022, 16 (05) : 169 - 176
  • [17] Challenges and future directions of secure federated learning: a survey
    Zhang, Kaiyue
    Song, Xuan
    Zhang, Chenhan
    Yu, Shui
    FRONTIERS OF COMPUTER SCIENCE, 2022, 16 (05)
  • [18] Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions
    Bagga, Palak
    Das, Ashok Kumar
    Chamola, Vinay
    Guizani, Mohsen
    TELECOMMUNICATION SYSTEMS, 2022, 81 (01) : 125 - 173
  • [19] A comprehensive survey on RPL routing-based attacks, defences and future directions in Internet of Things
    Prajapati, Anil Kumar
    Pilli, Emmanuel S.
    Battula, Ramesh Babu
    Varadharajan, Vijay
    Verma, Abhishek
    Joshi, R. C.
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 123
  • [20] Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions
    Palak Bagga
    Ashok Kumar Das
    Vinay Chamola
    Mohsen Guizani
    Telecommunication Systems, 2022, 81 : 125 - 173