PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

A study of various authentication mechanisms towards the secure Internet of Things networks

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Internet of Things (IoT) plays a major function in the public infrastructure, including power grids, control systems, smart cards, smart cities, intelligent transportation, education, and so on. The IoT networks provide ample benefits arising from transmission of the data between the IoT nodes and the servers. However, security constitutes a major concern in the IoT applications, as secret information may get disclosed to the unauthorized third-party in the network. Thus, secure authentication is a major requirement for managing and communicating with respect to the devices in the IoT environment. In this survey, 50 research papers are reviewed, referring to various authentication protocols used for ensuring adequate security in the network. The authentication methods are categorized on the basis of the security mechanisms, namely, the lightweight approach, the identity approach, the mutual authentication approach, and the cryptography-based authentication approaches, with the challenges faced by these existing methods being reported. Moreover, a simple overview is provided based on authentication protocols, toolsets, and evaluation metrics. Conform to this survey, most of the research articles concentrated on the lightweightbased approaches, and the most commonly applied evaluation metrics include packet loss, throughput, and efficiency.
Rocznik
Strony
393--418
Opis fizyczny
Bibliogr. 50 poz., rys., tab.
Twórcy
  • Department of Computer Science and Engineering, GITAM School of Technology, GITAM (Deemed to be University), Bengaluru, India
  • Department of Computer Science and Engineering, GITAM School of Technology, GITAM (Deemed to be University), Bengaluru, India
Bibliografia
  • Alcaide, A., Palomar, E., Montero-Castillo, J. and Ribagorda, A. (2013) Anonymous authentication for privacy-preserving IoT target-driven applications. Computers & Security, 37, 111-123.
  • Alshahrani, M., Traore, I. and Woungang, I. (2019) Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique. Internet of Things, 100061.
  • Aman, M. N., Chua, K. C. and Sikdar, B. (2017) Mutual authentication in IoT systems using physical unclonable functions. IEEE Internet of Things Journal, 4(5): 1327-1340.
  • Amin, R., Kumar, N., Biswas, G.P., Iqbal, R. and Chang, V. (2018) A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment. Future Generation Computer Systems, 78, 1005-1019.
  • Arafin, M. T., Gao, M. and Qu, G. (2017) VOLtA: Voltage over-scaling based lightweight authentication for IoT applications. In: IEEE 22nd Asia and South Pacific Design Automation Conference (ASP-DAC), 336-341.
  • Arasteh, S., Aghil, S.F. and Mala, H. (2016) A new lightweight authentication and key agreement protocol for Internet of Things. In: IEEE 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC), 52-59.
  • Caparra, G., Centenaro, M., Laurenti, N., Tomasin, S. and Vangelista, L. (2016) Energy-based anchor node selection for IoT physical layer authentication. In: IEEE International Conference on Communications (ICC), 1-6.
  • Dhillon, P. K. and Kalra, S. (2017) A lightweight biometrics based remote user authentication scheme for IoT services. Journal of Information Security and Applications, 34, 255-270.
  • Emerson, S., Choi, Y. K., Hwang, D. Y., Kim, K. S. and Kim, K. H. (2015) An OAuth based authentication mechanism for IoT networks. In: IEEE International Conference on Information and Communication Technology Convergence (ICTC), 1072-1074.
  • Esfahani, A., Mantas, G., Matischek, R., Saghezchi, F. B., Rodriguez, J., Bicaku, A., Maksuti, S., Taube, M., Schmittner, C. and Bastos, J. (2017) A lightweight authentication mechanism for m2m communications in industrial IoT environment. IEEE Internet of Things Journal, 6 (1), 288 – 296.
  • Gaikwad, P. P., Gabhane, J. P. and Golait, S. S. (2015) 3-level secure Kerberos authentication for Smart Home Systems using IoT. In: IEEE 1st International Conference on Next Generation Computing Technologies (NGCT), 262-268.
  • Gope, P., Amin, R., Islam, S. H., Kumar, N. and Bhalla, V. K. (2018) Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Generation Computer Systems, 83, 629-637.
  • Hammi, M. T., Livolant, E., Bellot, P., Serhrouchni, A. and Minet, P. (2017) A lightweight mutual authentication protocol for the IoT. In: International Conference on Mobile and Wireless Technology, Springer, Singapore, 3-12.
  • Hammi, M. T., Hammi, B., Bellot, P. and Serhrouchni, A. (2018) Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. Computers & Security, 78, 126-142.
  • Hou, J. L. and Yeh, K. H. (2015) Novel authentication schemes for IoT based healthcare systems. International Journal of Distributed Sensor Networks, 11(11): 183659.
  • Janbabaei, S., Gharaee, H. and Mohammadzadeh, N. (2016) Lightweight, anonymous and mutual authentication in IoT infrastructure. In: IEEE 8th International Symposium on Telecommunications (IST), 162-166.
  • Kalra, S. and Sood, S. K. (2015) Secure authentication scheme for IoT and cloud servers. Pervasive and Mobile Computing, 24, 210-223.
  • Kothmayr, T., Schmitt, C., Hu, W., Br¨unig, M. and Carle, G. (2012) A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication. In: IEEE Conference on Local Computer Networks-Workshops, 956-963.
  • Kothmayr, T., Schmitt, C., Hu, W., Br¨unig, M. and Carle, G. (2013) DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Networks, 11(8): 2710-2723.
  • Kumari, S., Karuppiah, M., Das, A. K., Li, X., Wu, F. and Kumar, N. (2017) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. The Journal of Supercomputing, 74,1-26.
  • Li, N., Liu, D. and Nepal, S. (2017) Lightweight mutual authentication for IoT and its applications. IEEE Transactions on Sustainable Computing, 2(4): 359-370.
  • Li, C. T., Wu, T. Y., Chen, C. L., Lee, C. C. and Chen, C. M. (2017a) An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors, 17(7): 1482.
  • Li, X., Peng, J., Niu, J., Wu, F., Liao, J. and Choo, K. K. R. (2017b) A robust and energy efficient authentication protocol for industrial internet of things. IEEE Internet of Things Journal, 5(3): 1606-1615.
  • Mahalle, P. N., Anggorojati, B., Prasad, N. R. and Prasad, R. (2013) Identity authentication and capability based access control (iacac) for the internet of things. Journal of Cyber Security and Mobility, 1(4): 309-348.
  • Mahalle, P. N., Prasad, N. R. and Prasad, R. (2014) Threshold cryptography-based group authentication (TCGA) scheme for the internet of things (IoT). In: IEEE 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 1-5.
  • Markmann, T., Schmidt, T.C. and W¨ahlisch, M. (2015) Federated end to-end authentication for the constrained internet of things using ibc and ecc. ACM SIGCOMM Computer Communication Review, 45(4): 603-604.
  • Mick, T., Tourani, R. and Misra, S. (2017) Laser: Lightweight authentication and secured routing for IoT in smart cities. IEEE Internet of Things Journal, 5(2): 755-764.
  • Mishra, D., Vijayakumar, P., Sureshkumar, V., Amin, R., Islam, S. H. and Gope, P. (2018) Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimedia Tools and Applications, 77(14): 18295-18325.
  • Moosavi, S. R., Gia, T. N., Rahmani, A. M., Nigussie, E., Virtanen, S., Isoaho, J. and Tenhunen, H. (2015) SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Computer Science, 52, 452-459.
  • Ning, H., Liu, H. and Yang, L.T. (2014) Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Transactions on Parallel and Distributed Systems, 26(3): 657-667.
  • Park, N., Kim, M. and Bang, H. C. (2015) Symmetric key-based authentication and the session key agreement scheme in IoT environment. In: Computer Science and its Applications. Springer, Berlin, Heidelberg, 330, 379-384.
  • Porambage, P., Schmitt, C., Kumar, P., Gurtov, A. and Ylianttila, M. (2014a) Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. IEEE Wireless Communications and Networking Conference (WCNC), 2728-2733.
  • Porambage, P., Schmitt, C., Kumar, P., Gurtov, A. and Ylianttila, M. (2014b) PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications. International Journal of Distributed Sensor Networks, 10(7): 357-430.
  • Punithavathi, P., Geetha, S., Karuppiah, M., Islam, S. H., Hassan, M. M. and Choo, K. K. R. (2019) A lightweight machine learning-based authentication framework for smart IoT devices. Information Sciences, 484, 255-268.
  • Salman, O., Abdallah, S., Elhajj, I. H., Chehab, A. and Kayssi, A. (2016) Identity-based authentication scheme for the Internet of Things. IEEE Symposium on Computers and Communication (ISCC), 1109-1111.
  • Saxena, N., Grijalva, S. and Chaudhari, N.S. (2016) Authentication protocol for an IoT-enabled LTE network. ACM Transactions on Internet Technology (TOIT), 16(4): 25.
  • Sciancalepore, S., Piro, G., Boggia, G. and Bianchi, G. (2016) Public key authentication and key agreement in IoT devices with minimal airtime consumption. IEEE Embedded Systems Letters, 9(1): 1-4.
  • Shivraj, V. L., Rajan, M. A., Singh, M. and Balamuralidhar, P. (2015) One time password authentication scheme based on elliptic curves for Internet of Things (IoT). In: IEEE 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), 1-6.
  • Tamboli, M. B. and Dambawade, D. (2016) Secure and efficient CoAP based authentication and access control for Internet of Things (IoT). In: IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 1245-1250.
  • Tewari, A. and Gupta, B. B. (2017a) A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices. International Journal of Advanced Intelligence Paradigms, 9(2-3): 111-121.
  • Tewari, A. and Gupta, B. B. (2017b) Cryptanalysis of a novel ultralightweight mutual authentication protocol for IoT devices using RFID tags. The Journal of Supercomputing, 73(3): 1085-1102.
  • Wallrabenstein, J. R. (2016) Practical and secure IoT device authentication using physical unclonable functions. In: IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), 99-106.
  • Wang, K. H., Chen, C. M., Fang, W. and Wu, T. Y. (2018) On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags. The Journal of Supercomputing, 74(1): 65-70.
  • Witkovski, A., Santin, A., Abreu, V. and Marynowski, J. (2015) An IdM and key-based authentication method for providing single sign-on in IoT. In: IEEE Global Communications Conference (GLOBECOM), 1-6.
  • Wu, F., Xu, L., Kumari, S., Li, X., Shen, J., Choo K. K. R., Wazid M. and Das A. K. (2017) An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. Journal of Network and Computer Applications, 89, 72-85.
  • Yang, Y., Cai, H., Wei, Z., Lu, H. and Choo, K. K. R. (2016) Towards lightweight anonymous entity authentication for IoT applications. In: Proceedings of Australasian Conference on Information Security and Privacy. Springer, Cham 265-280.
  • Yao, X., Han X., Du X. and Zhou X. (2013) A lightweight multicast authentication mechanism for small scale IoT applications. IEEE Sensors Journal, 13(10): 3693-3701.
  • Ye, N., Zhu, Y., Wang, R. C., Malekian, R. and Qiao-min, L. (2014) An efficient authentication and access control scheme for perception layer of internet of things. Applied Mathematics & Information Sciences, 8(4): 1617.
  • Zhao, G., Si, X., Wang, J., Long, X. and Hu, T. (2011) A novel mutual authentication scheme for Internet of Things. In: IEEE International Conference on Modelling, Identification and Control, 563-566.
  • Zhou, L., Li, X., Yeh, K. H., Su, C. and Chiu, W. (2019) Lightweight IoTbased authentication scheme in cloud computing circumstance. Future Generation Computer Systems, 91, 244-251.
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2021).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-0ac21497-eb3d-447a-87a0-692a6f424978
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.