Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey

被引:5
|
作者
Ahvanooey, Milad Taleby [1 ]
Zhu, Mark Xuefang [1 ]
Li, Qianmu [2 ,3 ]
Mazurczyk, Wojciech [4 ]
Choo, Kim-Kwang Raymond [5 ]
Gupta, Birij B. [6 ,7 ,8 ]
Conti, Mauro [9 ,10 ]
机构
[1] Nanjing Univ, Sch Informat Management, Nanjing 210023, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing 210094, Peoples R China
[3] Wuyi Univ, Sch Intelligent Mfg, Hangmen 529020, Peoples R China
[4] Warsaw Univ Technol, Inst Comp Sci, PL-00661 Warsaw, Poland
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Natl Inst Technol, Dept Comp Engn, Kurukshetra 136119, Haryana, India
[7] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[8] Staffordshire Univ, Sch Digital Technol & Arts, Stoke On Trent ST4 2DE, Staffs, England
[9] Univ Padua, Dept Math, I-35131 Padua, Italy
[10] Delft Univ Technol, Fac Elect Engn Math & Comp Sci, NL-2628 CD Delft, Netherlands
关键词
Internet of Things; Passwords; Smart phones; Electronic mail; Intelligent sensors; Computer crime; Servers; Authentication schemes (ASs); biometrics; cracking attacks; graphical passwords; Internet of Things (IoT); password security; ONE-TIME PASSWORD; USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; BIOMETRIC AUTHENTICATION; MULTIMODAL APPROACH; SMART ENVIRONMENTS; DEFENSE-MECHANISMS; LIVENESS DETECTION; REPLAY ATTACKS; INTERNET;
D O I
10.1109/JIOT.2021.3138073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication remains a challenging issue, despite the existence of a large number of proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web-based, and hardware-based schemes. For example, some of these schemes are not suitable for deployment in an Internet of Things (IoT) setting, partly due to the hardware and/or software constraints of IoT devices. The increasing popularity and pervasiveness of IoT equipment in a broad range of settings reinforces the importance of ensuring the security and privacy of IoT devices. Therefore, in this article, we conduct a comprehensive literature review and an empirical study to gain an in-depth understanding of the different authentication schemes as well as their vulnerabilities and deficits against various types of cyberattacks when applied in IoT-based systems. Based on the identified limitations, we recommend several mitigation strategies and discuss the practical implications of our findings.
引用
收藏
页码:7639 / 7663
页数:25
相关论文
共 50 条
  • [1] A Survey of Internet of Things (IoT) Authentication Schemes
    El-hajj, Mohammed
    Fadlallah, Ahmad
    Chamoun, Maroun
    Serhrouchni, Ahmed
    SENSORS, 2019, 19 (05)
  • [2] Biometric Authentication Methods on Smartphones: A Survey
    Spolaor, Riccardo
    Li, QianQian
    Monaro, Merylin
    Conti, Mauro
    Gamberini, Luciano
    Sartori, Giuseppe
    PSYCHNOLOGY JOURNAL, 2016, 14 (2-3): : 87 - 98
  • [3] A survey on behavioral biometric authentication on smartphones
    Mahfouz, Ahmed
    Mahmoud, Tarek M.
    Eldin, Ahmed Sharaf
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2017, 37 : 28 - 37
  • [4] Online Signature Verification: A Survey on Authentication in Smartphones
    Akram, Waseem
    Shah, Munam Ali
    ADVANCES IN UBIQUITOUS NETWORKING 2, 2017, 397 : 471 - 480
  • [5] A Survey on Authentication Schemes of VANETs
    Jenefa, J.
    Anita, E. A. Mary
    2016 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2016,
  • [6] Innovative Authentication Method for IoT Devices
    Vasile, Daniel C.
    Svasta, Paul M.
    2019 22ND EUROPEAN MICROELECTRONICS AND PACKAGING CONFERENCE & EXHIBITION (EMPC), 2019,
  • [7] Lightweight Authentication for IOT Edge Devices
    Zerraza, Imane
    Informatica (Slovenia), 2024, 48 (18): : 15 - 20
  • [8] Authentication Management of Home IoT Devices
    Alam, Aniqa
    Molyneaux, Heather
    Stobert, Elizabeth
    HCI FOR CYBERSECURITY, PRIVACY AND TRUST (HCI-CPT 2021), 2021, 12788 : 3 - 21
  • [9] A Survey about User Requirements for Biometric Authentication on Smartphones
    Zirjawi, Nedaa
    Kurtanovic, Zijad
    Maalej, Walid
    2015 IEEE 2ND WORKSHOP ON EVOLVING SECURITY AND PRIVACY REQUIREMENTS ENGINEERING (ESPRE), 2015, : 1 - 6
  • [10] Lightweight Authentication Methods in IoT: Survey
    Ahmed, Waleed Kareem
    Mohammed, Rana Saad
    PROCEEDING OF THE 2ND 2022 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (CSASE 2022), 2022, : 241 - 246