Taxonomy of Authentication Techniques in Internet of Things (IoT)

被引:0
|
作者
El-hajj, Mohammed [1 ]
Chamoun, Maroun [1 ]
Fadlallah, Ahmad [2 ]
Serhrouchni, Ahmed [3 ]
机构
[1] USJ, Beirut, Lebanon
[2] USAL, Beirut, Lebanon
[3] Telecom ParisTech, Paris, France
关键词
Internet of Things (IoT); Security; Authentication; Taxonomy; USER AUTHENTICATION; SECURITY; SCHEME;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet of Things (IoT) is slowly but steadily becoming part of different aspects of our lives, with applications ranging from smart homes, to wearable devices, to healthcare, etc. This wide spectrum of applications results in shared data containing large amount of users' private information. The security of such information becomes a paramount concern. The IoT security requirements include data confidentiality, data integrity, authentication, access control, privacy, etc. In particular, authentication of IoT devices has a particular importance given the variety of attacks which might result from its breach [1]. This paper provides a survey of the different authentication schemes proposed in the literature. Through a multi-criteria classification, it compares and analyzes the existing authentication protocols, showing their advantages and disadvantages.
引用
收藏
页码:67 / 71
页数:5
相关论文
共 50 条
  • [21] A Data Taxonomy for Adaptive Multifactor Authentication in the Internet of Health Care Things
    Suleski, Tance
    Ahmed, Mohiuddin
    [J]. JOURNAL OF MEDICAL INTERNET RESEARCH, 2023, 25
  • [22] A Study of Power Management Techniques for Internet of Things (IoT)
    Kaur, Kawaljeet
    Kaur, Kiranbir
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 1781 - 1785
  • [23] Comparison of Data Aggregation Techniques In Internet of Things (IoT)
    Rahman, H.
    Ahmed, N.
    Hussain, I.
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1296 - 1300
  • [24] A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT)
    Hammi, Badis
    Fayad, Achraf
    Khatoun, Rida
    Zeadally, Sherali
    Begriche, Youcef
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (03): : 3440 - 3450
  • [25] Resilient Authentication and Authorization for the Internet of Things (IoT) Using Edge Computing
    Kim, Hokeun
    Kang, Eunsuk
    Broman, David
    Lee, Edward A.
    [J]. ACM TRANSACTIONS ON INTERNET OF THINGS, 2020, 1 (01):
  • [26] PSAF-IoT: Physically Secure Authentication Framework for the Internet of Things
    Alruwaili, Omar
    Alotaibi, Faisal Mohammed
    Tanveer, Muhammad
    Chaoui, Slim
    Armghan, Ammar
    [J]. IEEE ACCESS, 2024, 12 : 78549 - 78561
  • [27] A Comprehensive Authentication Taxonomy and Lightweight Considerations in the Internet-of-Medical-Things (IoMT)
    Julaihi, Azlina binti Ahmadi
    Ngadi, Md Asri
    Radzi, Raja Zahilah binti Raja Mohd
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (08) : 1013 - 1025
  • [28] A Taxonomy of Multimedia-based Graphical User Authentication for Green Internet of Things
    Awan, Kamran Ahmad
    Din, Ikram Ud
    Almogren, Abeer
    Kumar, Neeraj
    Almogren, Ahmad
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (02)
  • [29] The Internet of Things (IoT): a survey of techniques, operating systems, and trends
    Shammar, Elham Ali
    Zahary, Ammar Thabit
    [J]. LIBRARY HI TECH, 2019, 38 (01) : 5 - 66
  • [30] MADS Based on DL Techniques on the Internet of Things (IoT): Survey
    Talal, Hussah
    Zagrouba, Rachid
    [J]. ELECTRONICS, 2021, 10 (21)