Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey

被引:9
|
作者
Ahvanooey, Milad Taleby [1 ]
Zhu, Mark Xuefang [1 ]
Li, Qianmu [2 ,3 ]
Mazurczyk, Wojciech [4 ]
Choo, Kim-Kwang Raymond [5 ]
Gupta, Birij B. [6 ,7 ,8 ]
Conti, Mauro [9 ,10 ]
机构
[1] Nanjing Univ, Sch Informat Management, Nanjing 210023, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing 210094, Peoples R China
[3] Wuyi Univ, Sch Intelligent Mfg, Hangmen 529020, Peoples R China
[4] Warsaw Univ Technol, Inst Comp Sci, PL-00661 Warsaw, Poland
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Natl Inst Technol, Dept Comp Engn, Kurukshetra 136119, Haryana, India
[7] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[8] Staffordshire Univ, Sch Digital Technol & Arts, Stoke On Trent ST4 2DE, Staffs, England
[9] Univ Padua, Dept Math, I-35131 Padua, Italy
[10] Delft Univ Technol, Fac Elect Engn Math & Comp Sci, NL-2628 CD Delft, Netherlands
关键词
Internet of Things; Passwords; Smart phones; Electronic mail; Intelligent sensors; Computer crime; Servers; Authentication schemes (ASs); biometrics; cracking attacks; graphical passwords; Internet of Things (IoT); password security; ONE-TIME PASSWORD; USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; BIOMETRIC AUTHENTICATION; MULTIMODAL APPROACH; SMART ENVIRONMENTS; DEFENSE-MECHANISMS; LIVENESS DETECTION; REPLAY ATTACKS; INTERNET;
D O I
10.1109/JIOT.2021.3138073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication remains a challenging issue, despite the existence of a large number of proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web-based, and hardware-based schemes. For example, some of these schemes are not suitable for deployment in an Internet of Things (IoT) setting, partly due to the hardware and/or software constraints of IoT devices. The increasing popularity and pervasiveness of IoT equipment in a broad range of settings reinforces the importance of ensuring the security and privacy of IoT devices. Therefore, in this article, we conduct a comprehensive literature review and an empirical study to gain an in-depth understanding of the different authentication schemes as well as their vulnerabilities and deficits against various types of cyberattacks when applied in IoT-based systems. Based on the identified limitations, we recommend several mitigation strategies and discuss the practical implications of our findings.
引用
收藏
页码:7639 / 7663
页数:25
相关论文
共 50 条
  • [11] Configurable Anonymous Authentication Schemes For The Internet of Things (IoT)
    Rasheed, Amar
    Hashemi, Ray R.
    Bagabas, Ayman
    Young, Jeffrey
    Badri, Chanukya
    Patel, Keyur
    2019 IEEE INTERNATIONAL CONFERENCE ON RFID (IEEE RFID), 2019,
  • [12] Novel Authentication Schemes for IoT Based Healthcare Systems
    Hou, Jia-Li
    Yeh, Kuo-Hui
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [13] A Lightweight Authentication and Key Agreement Schemes for IoT Environments
    Lee, Dae-Hwi
    Lee, Im-Yeong
    SENSORS, 2020, 20 (18) : 1 - 18
  • [14] Security and IoT Cloud Federation: Design of Authentication Schemes
    Barreto, Luciano
    Celesti, Antonio
    Villari, Massimo
    Fazio, Maria
    Puliafito, Antonio
    INTERNET OF THINGS: IOT INFRASTRUCTURES, PT I, 2016, 169 : 337 - 346
  • [15] FlexPass: Symbiosis of Seamless User Authentication Schemes in IoT
    Belk, Marios
    Fidas, Christos
    Pitsillides, Andreas
    CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
  • [16] A Lightweight Authentication Mechanism between IoT Devices
    Han, Jin-Hee
    Kim, JeongNyeo
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 1153 - 1155
  • [17] Authentication and Authorization for IoT Devices in Disadvantaged Environments
    Echeverria, Sebastian
    Lewis, Grace A.
    Klinedinst, Dan
    Seitz, Ludwig
    2019 IEEE 5TH WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2019, : 368 - 373
  • [18] Device Authentication for IoT Devices using ECC
    Krithiga, J.
    Krishnan, S.
    Nithisha, Sai M.
    Shree, Jeevika A.
    Lokeswari, S.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2020, 13 (03): : 162 - 166
  • [19] Authentication and Trustful Communication Protocol for IoT Devices
    Kobayashi, Seiya
    Miyazaki, Toshiaki
    PROCEEDINGS OF THE 2021 15TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2021), 2021,
  • [20] A Physical Layer Authentication Mechanism for IoT Devices
    Xinglu Li
    Kaizhi Huang
    Shaoyu Wang
    Xiaoming Xu
    China Communications, 2022, 19 (05) : 129 - 140