Review on Security of Internet of Things Authentication Mechanism

Document Type

Article

Publication Date

1-1-2019

Abstract

Internet of things (IoT) is considered as a collection of heterogeneous devices, such as sensors, Radio-frequency identification (RFID) and actuators, which form a huge network, enabling non-internet components in the network to produce a better world of services, like smart home, smart city, smart transportation, and smart industries. On the other hand, security and privacy are the most important aspects of the IoT network, which includes authentication, authorization, data protection, network security, and access control. Additionally, traditional network security cannot be directly used in IoT networks due to its limitations on computational capabilities and storage capacities. Furthermore, authentication is the mainstay of the IoT network, as all components undergo an authentication process before establishing communication. Therefore, securing authentication is essential. In this paper, we have focused on IoT security particularly on their authentication mechanisms. Consequently, we highlighted enormous attacks and technical methods on the IoT authentication mechanism. Additionally, we discussed existing security verification techniques and evaluation schemes of IoT authentication. Furthermore, analysis against current existing protocols have been discussed in all parts and provided some recommendation. Finally, the aim of our study is to help the future researcher by providing security issues, open challenges and future scopes in IoT authentication. © 2013 IEEE.

Keywords

Authentication, authentication protocols, Internet of Things, network attacks, security, wireless sensor network

Divisions

fsktm

Funders

RU Grants (Under Faculties) GPF009D-2018 in part by the Malaysia Research University Network (MRUN),Long Term Research Grant Scheme (LRGS) (LR003-2019 and LRGS MRUN/F2/01/2019/001),Partnership grant between the University of Malaya and Sunway University under Grant RK004-2017

Publication Title

IEEE Access

Volume

7

Publisher

Institute of Electrical and Electronics Engineers

This document is currently not available here.

Share

COinS