Taxonomy of Authentication Techniques in Internet of Things (IoT)

被引:0
|
作者
El-hajj, Mohammed [1 ]
Chamoun, Maroun [1 ]
Fadlallah, Ahmad [2 ]
Serhrouchni, Ahmed [3 ]
机构
[1] USJ, Beirut, Lebanon
[2] USAL, Beirut, Lebanon
[3] Telecom ParisTech, Paris, France
关键词
Internet of Things (IoT); Security; Authentication; Taxonomy; USER AUTHENTICATION; SECURITY; SCHEME;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet of Things (IoT) is slowly but steadily becoming part of different aspects of our lives, with applications ranging from smart homes, to wearable devices, to healthcare, etc. This wide spectrum of applications results in shared data containing large amount of users' private information. The security of such information becomes a paramount concern. The IoT security requirements include data confidentiality, data integrity, authentication, access control, privacy, etc. In particular, authentication of IoT devices has a particular importance given the variety of attacks which might result from its breach [1]. This paper provides a survey of the different authentication schemes proposed in the literature. Through a multi-criteria classification, it compares and analyzes the existing authentication protocols, showing their advantages and disadvantages.
引用
收藏
页码:67 / 71
页数:5
相关论文
共 50 条
  • [1] Analysis of Authentication Techniques in Internet of Things (IoT)
    El-hajj, Mohammed
    Chamoun, Maroun
    Fadlallah, Ahmad
    Serhrouchni, Ahmed
    [J]. 2017 1ST CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2017,
  • [2] Securing the Internet of Things (IoT): A Security Taxonomy for IoT
    Rizvi, Syed
    Pfeffer, Joseph, III
    Kurtz, Andrew
    Rizvi, Mohammad
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 163 - 168
  • [3] Internet of Things (IoT): Taxonomy of Security Attacks
    Nawir, Mukrimah
    Amir, Amiza
    Yaakob, Naimah
    Lynn, Ong Bi
    [J]. 2016 3RD INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN (ICED), 2016, : 321 - 326
  • [4] A Survey of Internet of Things (IoT) Authentication Schemes
    El-hajj, Mohammed
    Fadlallah, Ahmad
    Chamoun, Maroun
    Serhrouchni, Ahmed
    [J]. SENSORS, 2019, 19 (05)
  • [5] Research of authentication techniques for the Internet of things
    Yan, Hongqiang
    Wang, Linjie
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (07): : 213 - 222
  • [6] A Survey on Authentication Techniques for the Internet of Things
    Atwady, Yahya
    Hammoudeh, Mohammad
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [7] A Survey on Authentication Techniques for the Internet of Things
    Albalawi, Afrah
    Almrshed, Amal
    Badhib, Arwa
    Alshehri, Suhair
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 271 - 275
  • [8] Authentication Techniques for the Internet of Things: A Survey
    Saadeh, Maha
    Sleit, Azzam
    Qatawneh, Mohammed
    Almobaideen, Wesam
    [J]. 2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 28 - 34
  • [9] A Taxonomy of Security and Privacy Requirements for the Internet of Things (IoT)
    Alqassem, Israa
    Svetinovic, Davor
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2014, : 1244 - 1248
  • [10] Configurable Anonymous Authentication Schemes For The Internet of Things (IoT)
    Rasheed, Amar
    Hashemi, Ray R.
    Bagabas, Ayman
    Young, Jeffrey
    Badri, Chanukya
    Patel, Keyur
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON RFID (IEEE RFID), 2019,