A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

被引:25
|
作者
Rao, Patruni Muralidhara [1 ]
Deebak, B. D. [1 ,2 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, India
[2] Gachon Univ, Dept Comp Engn, Seongnam 13120, South Korea
关键词
Security and privacy; Authentication; Key-management; Internet of things; Network Models; WIRELESS SENSOR NETWORKS; 2-FACTOR USER AUTHENTICATION; EFFICIENT MUTUAL AUTHENTICATION; AGREEMENT SCHEME; LIGHTWEIGHT AUTHENTICATION; 3-FACTOR AUTHENTICATION; PRIVACY PRESERVATION; INTRUSION DETECTION; IOT; PROTOCOL;
D O I
10.1016/j.adhoc.2023.103159
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical infrastructures such as healthcare, intelligent transportation, and home automation adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The latest development in sensory and communication technologies collaborate directly with modern applications to bridge networking services without human intervention. Most information systems enable the extension of digital technology to demonstrate the potential use of next-generation network services and management. However, recent advancements open various opportunities, including repudiation, data tampering, and security threats in digital security and privacy. Thus, this survey article chooses a systematic literature review to present a comprehensive survey on authentication and key management in IoT. To discuss the major issues involved in IoT environments, this survey categorizes the work progress into four modules: 1. Discuss the broad aspects of convergence technologies, including healthcare, smart farming, intelligent transportation, etc., to address challenges such as security and privacy in IoT; 2. Conduct a comprehensive review of state-of-the-art technologies to identify security requirements, services, and challenges associated with modern IoT applications; 3. Present a systematic approach to review various key agreement schemes based on network models and performance analysis to examine potential vulnerabilities. 4. Show a thematic analysis to determine suitable corrective measurements dealing with various security and privacy issues. Finally, this paper rationalizes significant progress, including research challenges and future directions in IoT to promote new insights.
引用
收藏
页数:31
相关论文
共 50 条
  • [31] Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges
    Khan, Rafiullah
    Khan, Sarmad Ullah
    Zaheer, Rifaqat
    Khan, Shahid
    10TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2012), 2012, : 257 - 260
  • [32] Group and hierarchical key management for secure communications in internet of things
    Karrothu, Aravind
    Norman, Jasmine
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (13)
  • [33] COVID-19: Secure Healthcare Internet of Things Networks, Current Trends and Challenges with Future Research Directions
    Adil, Muhammad
    Ali, Jehad
    Jadoon, Muhammad Mohsin
    Alotaibi, Sattam Rabia
    Kumar, Neeraj
    Farouk, Ahmed
    Song, Houbing
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2023, 19 (03)
  • [34] A Comprehensive Survey of Cybersecurity Threats, Attacks, and Effective Countermeasures in Industrial Internet of Things
    Alnajim, Abdullah M.
    Habib, Shabana
    Islam, Muhammad
    Thwin, Su Myat
    Alotaibi, Faisal
    Mahmoud, Mohammed
    TECHNOLOGIES, 2023, 11 (06)
  • [35] OQAM-OFDM for Wireless Communications in Future Internet of Things: A Survey on Key Technologies and Challenges
    Chen, Da
    Tian, Yuan
    Qu, Daiming
    Jiang, Tao
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (05): : 3788 - 3809
  • [36] A comprehensive survey on secure software-defined network for the Internet of Things
    Mohamed, Monzir Babiker
    Alofe, Olasunkanmi Matthew
    Azad, Muhammad Ajmal
    Lallie, Harjinder Singh
    Fatema, Kaniz
    Sharif, Tahir
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (01)
  • [37] A Survey of Trust Management in WSNs, Internet of Things and Future Internet
    Chang, Kai-Di
    Chen, Jiann-Liang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01): : 5 - 23
  • [38] Internet of Things intrusion detection systems: a comprehensive review and future directions
    Heidari, Arash
    Jamali, Mohammad Ali Jabraeil
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 3753 - 3780
  • [39] Unleashing the power of internet of things and blockchain: A comprehensive analysis and future directions
    Rejeb A.
    Rejeb K.
    Appolloni A.
    Jagtap S.
    Iranmanesh M.
    Alghamdi S.
    Alhasawi Y.
    Kayikci Y.
    Internet of Things and Cyber-Physical Systems, 2024, 4 : 1 - 18
  • [40] Internet of Things intrusion detection systems: a comprehensive review and future directions
    Arash Heidari
    Mohammad Ali Jabraeil Jamali
    Cluster Computing, 2023, 26 : 3753 - 3780