Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges

被引:0
作者
Ullah, Shafi [1 ]
Bazai, Sibghat Ullah [1 ]
Imran, Mohammad [2 ]
Ilyas, Qazi Mudassar [3 ]
Mehmood, Abid [4 ]
Saleem, Muhammad Asim [5 ]
Rafique, Muhmmad Aasim [3 ]
Haider, Arsalan [6 ]
Khan, Ilyas [7 ]
Iqbal, Sajid [3 ]
Gulzar, Yonis [4 ]
Hameed, Kauser [3 ]
机构
[1] Balochistan Univ Informat Technol Engn & Managemen, Dept Comp Engn, Quetta 87300, Pakistan
[2] Balochistan Univ IT Engn & Management Sci, Dept Informat Technol, Quetta 87300, Pakistan
[3] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Informat Syst, Al Hasa 31982, Saudi Arabia
[4] King Faisal Univ, Coll Business Adm, Dept Management Informat Syst, Al Hasa 31982, Saudi Arabia
[5] Riphah Int Univ, Coll Comp, Dept Software Engn, Faisalabad 44000, Pakistan
[6] Balochistan Univ Informat Technol Engn & Managemen, Dept Elect Engn, Quetta 87300, Pakistan
[7] Majmaah Univ, Coll Sci Al Zulfi, Dept Math, Al Majmaah 11952, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 79卷 / 01期
关键词
Authentication; cyber security; internet of things; machine-type communication devices; machine-to-machine communication; WIRELESS SENSOR NETWORKS; LIGHTWEIGHT AUTHENTICATION; SECURITY; PROTOCOL; PRIVACY; INTERNET;
D O I
10.32604/cmc.2024.048796
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine -to -machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)based infrastructure, a vital part of the fourth industrial revolution. Machine -type communication devices (MTCDs) regularly share extensive data without human intervention while making all types of decisions. These decisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeat monitoring, and several different alert systems. Many of these devices simultaneously share data to form an automated system. The data shared between machine -type communication devices (MTCDs) is prone to risk due to limited computational power, internal memory, and energy capacity. Therefore, securing the data and devices becomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions, and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data is authentication, where each device must be verified before data transmission. Several M2M authentication schemes have been proposed in the literature, however, the literature lacks a comprehensive overview of current M2M authentication techniques and the challenges associated with them. To utilize a suitable authentication scheme for specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fills this gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerning application categories, security provisions, and performance efficiency.
引用
收藏
页码:93 / 115
页数:23
相关论文
共 50 条
[21]   PEASE: A PUF-Based Efficient Authentication and Session Establishment Protocol for Machine-to-Machine Communication in Industrial IoT [J].
Gong, Xiang ;
Feng, Tao ;
Albettar, Maher .
ELECTRONICS, 2022, 11 (23)
[22]   Quality-of-Decision-Driven Machine-Type Communication [J].
Zhao, Lindong ;
Wu, Dan ;
Zhou, Liang .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (17) :16631-16642
[23]   A Mechanism to Control the Congestion in Machine-to-Machine Communication in LTE-A Networks [J].
Aragao, David ;
Vieira, Dario ;
de Castro, Miguel Franklin .
2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, :794-797
[24]   Hybrid ORA and NORA schemes for machine-to-machine communication in long-term evolution networks [J].
Zhang, Mingyu ;
Li, Ying ;
Guo, Xudong .
IET COMMUNICATIONS, 2019, 13 (12) :1852-1858
[25]   Rage against the machine: does machine-to-machine communication fall within the scope of the confidentiality principle? [J].
Storms, Stijn ;
Valcke, Peggy ;
Kindt, Els .
INTERNATIONAL JOURNAL OF LAW AND INFORMATION TECHNOLOGY, 2019, 27 (04) :372-408
[26]   Machine Learning-Based Recommendation Trust Model for Machine-to-Machine Communication [J].
Eziama, Elvin ;
Jaimes, Luz M. S. ;
James, Agajo ;
Nwizege, Kenneth Sorle ;
Balador, Ali ;
Tepe, Kemal .
2018 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT), 2018,
[27]   Key establishment and management for Secure Cellular Machine-to-Machine Communication [J].
Doh, Inshil ;
Lim, Jiyoung ;
Li, Shi ;
Chae, Kijoon .
2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, :579-584
[28]   Rich Presence Information in Agent Based Machine-to-Machine Communication [J].
Kusek, Mario ;
Lovrek, Ignac ;
Maracic, Hrvoje .
17TH INTERNATIONAL CONFERENCE IN KNOWLEDGE BASED AND INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS - KES2013, 2013, 22 :321-329
[29]   ANALYSIS OF NEURAL IMAGE COMPRESSION NETWORKS FOR MACHINE-TO-MACHINE COMMUNICATION [J].
Fischer, Kristian ;
Forsch, Christian ;
Herglotz, Christian ;
Kaup, Andre .
2021 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2021, :2079-2083
[30]   A Dynamic LTE Uplink Packet Scheduler for Machine-to-Machine Communication [J].
Maia, Adyson M. ;
de Castro, Miguel F. ;
Vieira, Dario .
2014 IEEE 25TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATION (PIMRC), 2014, :1609-1614