A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

被引:25
|
作者
Rao, Patruni Muralidhara [1 ]
Deebak, B. D. [1 ,2 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, India
[2] Gachon Univ, Dept Comp Engn, Seongnam 13120, South Korea
关键词
Security and privacy; Authentication; Key-management; Internet of things; Network Models; WIRELESS SENSOR NETWORKS; 2-FACTOR USER AUTHENTICATION; EFFICIENT MUTUAL AUTHENTICATION; AGREEMENT SCHEME; LIGHTWEIGHT AUTHENTICATION; 3-FACTOR AUTHENTICATION; PRIVACY PRESERVATION; INTRUSION DETECTION; IOT; PROTOCOL;
D O I
10.1016/j.adhoc.2023.103159
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical infrastructures such as healthcare, intelligent transportation, and home automation adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The latest development in sensory and communication technologies collaborate directly with modern applications to bridge networking services without human intervention. Most information systems enable the extension of digital technology to demonstrate the potential use of next-generation network services and management. However, recent advancements open various opportunities, including repudiation, data tampering, and security threats in digital security and privacy. Thus, this survey article chooses a systematic literature review to present a comprehensive survey on authentication and key management in IoT. To discuss the major issues involved in IoT environments, this survey categorizes the work progress into four modules: 1. Discuss the broad aspects of convergence technologies, including healthcare, smart farming, intelligent transportation, etc., to address challenges such as security and privacy in IoT; 2. Conduct a comprehensive review of state-of-the-art technologies to identify security requirements, services, and challenges associated with modern IoT applications; 3. Present a systematic approach to review various key agreement schemes based on network models and performance analysis to examine potential vulnerabilities. 4. Show a thematic analysis to determine suitable corrective measurements dealing with various security and privacy issues. Finally, this paper rationalizes significant progress, including research challenges and future directions in IoT to promote new insights.
引用
收藏
页数:31
相关论文
共 50 条
  • [41] A Survey on Internet of Medical Things (IoMT): Enabling Technologies, Security and Explainability Issues, Challenges, and Future Directions
    Ozcelik, Mert Melih
    Kok, Ibrahim
    Ozdemir, Suat
    EXPERT SYSTEMS, 2025, 42 (05)
  • [42] Survey on security and privacy in Internet of Things-based eHealth applications: Challenges, architectures, and future directions
    Makina, Hela
    Ben Letaifa, Asma
    Rachedi, Abderrezak
    SECURITY AND PRIVACY, 2024, 7 (02)
  • [43] Yoga Meets Intelligent Internet of Things: Recent Challenges and Future Directions
    Pal, Rishi
    Adhikari, Deepak
    Heyat, Md Belal Bin
    Ullah, Inam
    You, Zili
    BIOENGINEERING-BASEL, 2023, 10 (04):
  • [44] Healthcare Internet of Things: Security Threats, Challenges, and Future Research Directions
    Adil, Muhammad
    Khan, Muhammad Khurram
    Kumar, Neeraj
    Attique, Muhammad
    Farouk, Ahmed
    Guizani, Mohsen
    Jin, Zhanpeng
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (11): : 19046 - 19069
  • [45] Internet of things: Conceptual network structure, main challenges and future directions
    Furstenau, Leonardo B.
    Rodrigues, Yan Pablo Reckziegel
    Sott, Michele Kremer
    Leivas, Pedro
    Dohan, Michael S.
    Lopez-Robles, Jose Ricardo
    Cobo, Manuel J.
    Bragazzi, Nicola Luigi
    Choo, Kim-Kwang Raymond
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (03) : 677 - 687
  • [46] Industrial Internet of Things: Requirements, Architecture, Challenges, and Future Research Directions
    Alabadi, Montdher
    Habbal, Adib
    Wei, Xian
    IEEE ACCESS, 2022, 10 : 66374 - 66400
  • [47] Secure Authentication and Key Agreement Protocol for Cloud-Assisted Industrial Internet of Things
    Hu, Huanhuan
    Liao, Longxia
    Zhao, Junhui
    ELECTRONICS, 2022, 11 (10)
  • [48] Internet of Things (IoT) security dataset evolution: Challenges and future directions
    Kaur, Barjinder
    Dadkhah, Sajjad
    Shoeleh, Farzaneh
    Neto, Euclides Carlos Pinto
    Xiong, Pulei
    Iqbal, Shahrear
    Lamontagne, Philippe
    Ray, Suprio
    Ghorbani, Ali A.
    INTERNET OF THINGS, 2023, 22
  • [49] Internet of things:Conceptual network structure,main challenges and future directions
    Leonardo BFurstenau
    Yan Pablo Reckziegel Rodrigues
    Michele Kremer Sott
    Pedro Leivas
    Michael SDohan
    Jos Ricardo LpezRobles
    Manuel JCobo
    Nicola Luigi Bragazzi
    KimKwang Raymond Choo
    Digital Communications and Networks, 2023, 9 (03) : 677 - 687
  • [50] A Secure Three Party Node Authentication and Key Establishment Scheme for the Internet of Things Environment
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (01): : 147 - 155