Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey

被引:9
|
作者
Ahvanooey, Milad Taleby [1 ]
Zhu, Mark Xuefang [1 ]
Li, Qianmu [2 ,3 ]
Mazurczyk, Wojciech [4 ]
Choo, Kim-Kwang Raymond [5 ]
Gupta, Birij B. [6 ,7 ,8 ]
Conti, Mauro [9 ,10 ]
机构
[1] Nanjing Univ, Sch Informat Management, Nanjing 210023, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing 210094, Peoples R China
[3] Wuyi Univ, Sch Intelligent Mfg, Hangmen 529020, Peoples R China
[4] Warsaw Univ Technol, Inst Comp Sci, PL-00661 Warsaw, Poland
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Natl Inst Technol, Dept Comp Engn, Kurukshetra 136119, Haryana, India
[7] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[8] Staffordshire Univ, Sch Digital Technol & Arts, Stoke On Trent ST4 2DE, Staffs, England
[9] Univ Padua, Dept Math, I-35131 Padua, Italy
[10] Delft Univ Technol, Fac Elect Engn Math & Comp Sci, NL-2628 CD Delft, Netherlands
关键词
Internet of Things; Passwords; Smart phones; Electronic mail; Intelligent sensors; Computer crime; Servers; Authentication schemes (ASs); biometrics; cracking attacks; graphical passwords; Internet of Things (IoT); password security; ONE-TIME PASSWORD; USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; BIOMETRIC AUTHENTICATION; MULTIMODAL APPROACH; SMART ENVIRONMENTS; DEFENSE-MECHANISMS; LIVENESS DETECTION; REPLAY ATTACKS; INTERNET;
D O I
10.1109/JIOT.2021.3138073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication remains a challenging issue, despite the existence of a large number of proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web-based, and hardware-based schemes. For example, some of these schemes are not suitable for deployment in an Internet of Things (IoT) setting, partly due to the hardware and/or software constraints of IoT devices. The increasing popularity and pervasiveness of IoT equipment in a broad range of settings reinforces the importance of ensuring the security and privacy of IoT devices. Therefore, in this article, we conduct a comprehensive literature review and an empirical study to gain an in-depth understanding of the different authentication schemes as well as their vulnerabilities and deficits against various types of cyberattacks when applied in IoT-based systems. Based on the identified limitations, we recommend several mitigation strategies and discuss the practical implications of our findings.
引用
收藏
页码:7639 / 7663
页数:25
相关论文
共 50 条
  • [21] A Physical Layer Authentication Mechanism for IoT Devices
    Li, Xinglu
    Huang, Kaizhi
    Wang, Shaoyu
    Xu, Xiaoming
    CHINA COMMUNICATIONS, 2022, 19 (05) : 129 - 140
  • [22] Modeling the Energy Consumption of Upload Patterns on Smartphones and IoT Devices
    Donatiello, Lorenzo
    Marfia, Gustavo
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (11) : 2258 - 2261
  • [23] Distinguishing Between Smartphones and IoT Devices via Network Traffic
    Hui, Shuodi
    Wang, Huandong
    Xu, Dianlei
    Wu, Jing
    Li, Yong
    Jin, Depeng
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (02) : 1182 - 1196
  • [24] Opportunistic Wireless Crowd Charging of IoT Devices from Smartphones
    Dhungana, Aashish
    Bulut, Eyuphan
    16TH ANNUAL INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS 2020), 2020, : 376 - 380
  • [25] Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments
    Wang, Ping
    Li, Bin
    Shi, Hongjin
    Shen, Yaosheng
    Wang, Ding
    SECURITY AND COMMUNICATION NETWORKS, 2019,
  • [26] New Features of Authentication Scheme for the IoT: A Survey
    Yang, Ting
    Zhang, GuangHua
    Liu, Ling
    Yang, YiYu
    Zhao, ShangRu
    Sun, HongYu
    Wang, WenJie
    PROCEEDINGS OF THE 2ND INTERNATIONAL ACM WORKSHOP ON SECURITY AND PRIVACY FOR THE INTERNET-OF-THINGS (IOT S&P'19), 2019, : 44 - 49
  • [27] A Survey of SIP Authentication and Key Agreement Schemes
    Kilinc, H. Hakan
    Yanik, Tugrul
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02): : 1005 - 1023
  • [28] A survey of broadcast authentication schemes for wireless networks
    Grover, Kanika
    Lim, Alvin
    AD HOC NETWORKS, 2015, 24 : 288 - 316
  • [29] A Survey of Android Mobile Phone Authentication Schemes
    Kunda, Douglas
    Chishimba, Mumbi
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (06): : 2558 - 2566
  • [30] Fragile watermarking schemes for image authentication: a survey
    K. Sreenivas
    V. Kamkshi Prasad
    International Journal of Machine Learning and Cybernetics, 2018, 9 : 1193 - 1218