Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey

被引:9
|
作者
Ahvanooey, Milad Taleby [1 ]
Zhu, Mark Xuefang [1 ]
Li, Qianmu [2 ,3 ]
Mazurczyk, Wojciech [4 ]
Choo, Kim-Kwang Raymond [5 ]
Gupta, Birij B. [6 ,7 ,8 ]
Conti, Mauro [9 ,10 ]
机构
[1] Nanjing Univ, Sch Informat Management, Nanjing 210023, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing 210094, Peoples R China
[3] Wuyi Univ, Sch Intelligent Mfg, Hangmen 529020, Peoples R China
[4] Warsaw Univ Technol, Inst Comp Sci, PL-00661 Warsaw, Poland
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Natl Inst Technol, Dept Comp Engn, Kurukshetra 136119, Haryana, India
[7] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[8] Staffordshire Univ, Sch Digital Technol & Arts, Stoke On Trent ST4 2DE, Staffs, England
[9] Univ Padua, Dept Math, I-35131 Padua, Italy
[10] Delft Univ Technol, Fac Elect Engn Math & Comp Sci, NL-2628 CD Delft, Netherlands
关键词
Internet of Things; Passwords; Smart phones; Electronic mail; Intelligent sensors; Computer crime; Servers; Authentication schemes (ASs); biometrics; cracking attacks; graphical passwords; Internet of Things (IoT); password security; ONE-TIME PASSWORD; USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; BIOMETRIC AUTHENTICATION; MULTIMODAL APPROACH; SMART ENVIRONMENTS; DEFENSE-MECHANISMS; LIVENESS DETECTION; REPLAY ATTACKS; INTERNET;
D O I
10.1109/JIOT.2021.3138073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication remains a challenging issue, despite the existence of a large number of proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web-based, and hardware-based schemes. For example, some of these schemes are not suitable for deployment in an Internet of Things (IoT) setting, partly due to the hardware and/or software constraints of IoT devices. The increasing popularity and pervasiveness of IoT equipment in a broad range of settings reinforces the importance of ensuring the security and privacy of IoT devices. Therefore, in this article, we conduct a comprehensive literature review and an empirical study to gain an in-depth understanding of the different authentication schemes as well as their vulnerabilities and deficits against various types of cyberattacks when applied in IoT-based systems. Based on the identified limitations, we recommend several mitigation strategies and discuss the practical implications of our findings.
引用
收藏
页码:7639 / 7663
页数:25
相关论文
共 50 条
  • [41] Lightweight Authentication and Secure Communication Suitable for IoT Devices
    Buchovecka, Simona
    Lorencz, Robert
    Bucek, Jiri
    Kodytek, Filip
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 75 - 83
  • [42] Verifying a secure authentication protocol for IoT medical devices
    Woo-Sik Bae
    Cluster Computing, 2019, 22 : 1985 - 1990
  • [43] Hardware Trust Anchor Authentication for Updatable IoT Devices
    Lorych, Dominik
    Plappert, Christian
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [44] PUF-based Authentication Scheme for IoT Devices
    Yoon, Seungyong
    Kim, Byoungkoo
    Kang, Yousung
    Choi, Dooho
    11TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE: DATA, NETWORK, AND AI IN THE AGE OF UNTACT (ICTC 2020), 2020, : 1792 - 1794
  • [45] Provisioning, Authentication and Secure Communications for IoT Devices on FIWARE
    Sousa, Patricia
    Magalhaes, Luis
    Resende, Joao
    Martins, Rolando
    Antunes, Luis
    SENSORS, 2021, 21 (17)
  • [46] A Novel Authentication Protocol for IoT-Enabled Devices
    He, Daojing
    Zhao, Ziming
    Chan, Sammy
    Guizani, Mohsen
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (01) : 867 - 876
  • [47] A Robust Anonymity Preserving Authentication Protocol for IoT Devices
    Tewari, Aakanksha
    Gupta, B. B.
    2018 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2018,
  • [48] DLT Based Authentication Framework for Industrial IoT Devices
    Lupascu, Cristian
    Lupascu, Alexandru
    Bica, Ion
    SENSORS, 2020, 20 (09)
  • [49] Verifying a secure authentication protocol for IoT medical devices
    Bae, Woo-Sik
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1985 - 1990
  • [50] Authentication of IoT Devices for WiFi Connectivity from the Cloud
    Zegeye, Wondimu
    Moazzami, Farzad
    2019 53RD ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2019,