PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Device authentication methods in Internet of Things networks

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
PL
Sposoby uwierzytelniania urządzeń w sieciach Internetu Rzeczy
Języki publikacji
EN
Abstrakty
EN
The article describes the basic requirements of authentication systems used in Internet of Things networks, and problems and attacks that may hinder or even prevent the process of authentication. The current methods used in device authentication are also presented.
PL
W artykule opisano podstawowe wymagania systemów uwierzytelniania stosowanych w sieciach Internetu Rzeczy oraz problemy i ataki, które mogą utrudnić lub nawet uniemożliwić przeprowadzenie procesu uwierzytelniania. Przedstawiono również obecne metody stosowane w uwierzytelnianiu urządzeń Internetu Rzeczy.
Twórcy
  • Institute of Teleinformatics and Cybersecurity, Faculty of Cybernetics, MUT, ul. gen. Sylwestra Kaliskiego 2, 00-908 Warsaw, Poland
Bibliografia
  • [1] ALI I., SABIR S., ULLAH Z., Internet of Things Security, Device Authentication and Access Control: A Review. International Journal of Computer Science and Information Security, Vol 14, No 8, 2016, pp. 456-466.
  • [2] ALMULHIM M., ZAMAN N., Proposing secure and lightweight authentication scheme for IoT based E-health applications. 2018 20th International Conference on Advanced Communication Technology (ICACT), 2018, pp. 481-487.
  • [3] BRAEKEN A., PUF Based Authentication Protocol for IoT. Symmetry 2018, 10 (8), 352, 2018, pp. 1-15.
  • [4] BURHAN M., REHMAN R., KHAN B., BYUNG-SEO K., IoT Elements, Layered Architectures and Security Issues: A comprehensive Survey. Sensors 2018, pp. 1-37.
  • [5] DAVIES R., The Internet of Things – Opportunities and challenges. European Parliamentary Research Service, 2015, pp. 1-8.
  • [6] DEOGIRIKAR J., VIDHATE A., Security Attacks in IoT: A Survey. International Conference on I-SMAC, 2017, pp. 32-37
  • [7] FERRAG M.A., MAGLARAS L.A., JANICKE H., JIANG J., Authentication Protocols for Internet of Things: A Comprehensive Survey. Hindawi, Security and Communication Networks, Vol. 2017, 2017, pp. 1-41.
  • [8] FURTAK J., ZIELIŃSKI Z., CHUDZIKIEWICZ J., Procedures for sensor nodes operation in the secured domain. Concurrency and Computation: Practice and Experience, 2019, Vol. 0, pp. 1-13.
  • [9] HASAN A., QUERSHI K., Internet of Things Device Authentication Scheme using Hardware Serialization. 2018 International Conference on Applied and Engineering Mathematics, 2018, pp. 109-114.
  • [10] KOO J., OH S.-R., KIM YG., Device Identification Interoperability in Heterogeneous IoT Platforms. Sensors 2019, 2019, pp. 1-16.
  • [11] KOTHMAYR T., SCHMITT C., HU W., BRÜNIG M., CARLE G., A DTLS Based End- To-End Security Architecture for the Internet of Things with Two-Way Authentication. Local Computer Networks Workshops, 2012, pp. 956-963.
  • [12] LAU C., YEUNG A., YAN F., Blockchain-based Authentication in IoT Networks. 2018 IEEE Conference on Dependable and Secure Computing (DSC), 2018, pp. 1-8
  • [13] LEE C., KIM K., Implementation of IoT System using BlockChain with Authentication and Data Protection. 2018 International Conference on Information Networking (ICOIN), 2018, pp. 936-940.
  • [14] MAES R., VERBAUWHEDE I., Physically Unclonable Functions: a Study on the State of the Art and Future Research Directions. Towards Hardware-Intrinsic Security, 2010, pp. 1-37.
  • [15] MEIDAN Y., BOHADANA M., SHABTAI A., GUARNIZO J.D., OCHOA M., TIPPENHAUER N.O., ELOVICI Y., ProfilIoT: A Machine Learning Approach for IoT Device Identification Based on Network Traffic Analysis. SAC `17 Proceedings of the Symposium on Applied Computing, 2017, pp. 506-509.
  • [16] MUKHOPADHYPAY D., PUFs as Promising Tools for Security in Internet of Things. IEEE Design & Test, Volume 33, Issue 3, 2016, pp. 103-115.
  • [17] NICANFAR H., JOKAR P., LEUNG V., Smart Grid Authentication and Key Management for Unicast and Multicast Communications. 2011 IEEE PES Innovative Smart Grid Technologies, 2011, https://ieeexplore.ieee.org/document/6167151
  • [18] NING H., LIU H., LIU Q., JI G., Directed Path Based Authentication Scheme for the Internet of Things. Journal of Universal Computer Science vol. 18, no. 9, 2012, pp. 1112-1131.
  • [19] RABIAH A., RAMAKRISHNAN K., LIRI E., KAR K., A Lightweight Authentication and Key Exchange Protocol for IoT. Workshop on Decentralized IoT Security and Standards 2018, 2018, pp. 1-6.
  • [20] SCHIMTT C., NOACK M., STILLER B., TinyTO: Two-way Authentication for Constrained Devices in the Internet-of-Things. Internet of Things, 2015, pp. 239-258
  • [21] SCHUKAT M., CARTIJO P., Public key infrastructures and digital certificates for the Internet of things, 2015 26th Irish Signals and Systems Conference (ISSC), 2015, https://ieeexplore.ieee.org/abstract/document/7163785
  • [22] SETHI P., SARANGI S.R., Internet of Things: Architectures, Protocols, and Applications. Journal of Electrical and Computer Engineering, 2017, pp. 1-25.
  • [23] SHAH T., VENKATESAN S., Authentication of IoT Device and IoT Server Using Security Vaults. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, 2017, pp. 819-824.
  • [24] SHIVRAJ V., RAJAN M., SINGH M., BALAMURALIDHAR P., One time password authentication scheme based on elliptic curves for Internet of Things (IoT). 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), 2015, pp. 1-6.
  • [25] SPIESS P. I INNI, SOA-based Integration of the Internet of Things in Enterprise Services. 2009 IEEE International Conference on Web Services, 2009, pp. 968-975.
  • [26] STEWART J.M., CompTIA Security+ Review Guide. Sybex, Indianapolis, 2014.
  • [27] TASALI Q., CHOWDHURY C., VASSERMAN E., A Flexible Authorization Architecture for Systems of Interoperable Medical Devices. SACMAT`17, 2017, pp. 9-20.
  • [28] TORKAMAN A., SEYYEDI M.A., Analyzing IoT References Architecture Model. International Journal of Computer Science and Software Engineering, Volume 5, Issue 8, August 2016, pp. 154-160.
  • [29] TRIPATHY B.K., ANURADHA J., Internet of Things (IoT) Technologies, Applications, Challenges and Solutions. CRC Press, Boca Raton, 2017.
  • [30] TRNKA M., CERNY T., STICKNEY N., Survey of Authentication and Authorization for the Internet of Things. Hindawi, Security and Communication Networks Volume 2018, 2018, pp. 1-17.
  • [31] WANG K.H., CHEN C.M., FANG W., WU T.Y., A secure authentication scheme for Internet of Things. Pervasive and Mobile Computing 42, 2017, pp. 15-26.
  • [32] WON J., SINGLA A., BERTINO E., BOLLELLA G., Decentralized Public Key Infrastructure for Internet-of-Things. Milcom 2018 Track 5, 2018, pp. 1-7.
  • [33] ALUTHGE N., IoT device fingerprinting with sequence-based features, 2017, https://helda.helsinki.fi/handle/10138/234247 (accessed on 12.05.2019)
  • [34] An overview of the IoT Security Market Report 2017-2022, https://iiotworld. com/reports/an-overview-of-the-iot-security-market-report-2017-2022/ (accessed on 12.05.2019)
  • [35] Connecting applications, devices and gateways, IBM, https://www.ibm.com/support/knowledgecenter/en/SSQP8H/iot/platform/reference /security/connect_devices_apps_gw.html (accessed on 12.05.2019)
  • [36] ECC 101: What is ECC and why would I want to use it?, https://www.globalsign.com/en/blog/elliptic-curve-cryptography/ (accessed on 20.06.2019)
  • [37] Gartner Identifies Top 10 Strategic IoT Technologies and Trends, https://www.gartner.com/en/newsroom/press-releases/2018-11-07-gartneridentifies- top-10-strategic-iot-technologies-and-trends, 2018 (accessed on 12.05.2019)
  • [38] Identifiers in Internet of Things, Alliance for Internet of Things Innovation, Version 1.0, 2018, https://aioti.eu/wp-content/uploads/2018/03/AIOTIIdentifiers_ in_IoT-1_0.pdf.pdf, (accessed on 10.05.2019)
  • [39] Series Y: Global Information Infrastructure, Internet Protocol Aspects and Next- Generation Network. Overview of the Internet of things, TELECOMMUNICATION STANDARIZATION SECTOR OD ITU, 2012, https://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-Y.2060-201206- I!!PDF-E&type=items (accessed on 12.05.2019)
  • [40] The Internet of Things (IoT) – Threats and Countermeasures, https://www.cso.com.au/article/575407/internet-things-iot-threatscountermeasures/ (accessed on 12.05.2019)
  • [41] The Internet of Things Reference Model, Cisco 2014, http://cdn.iotwf.com/resources/71/IoT_Reference_Model_White_Paper_June_4_20 14.pdf (accessed on 10.05.2019)
  • [42] Top 10 IoT security challenges, https://developer.ibm.com/articles/iot-top-10-iotsecurity- challenges/, 2017 (accessed on 12.05.2019)
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-7757f7d1-0013-40ac-bd73-ffc280da7dfc
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.