Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges

被引:0
作者
Ullah, Shafi [1 ]
Bazai, Sibghat Ullah [1 ]
Imran, Mohammad [2 ]
Ilyas, Qazi Mudassar [3 ]
Mehmood, Abid [4 ]
Saleem, Muhammad Asim [5 ]
Rafique, Muhmmad Aasim [3 ]
Haider, Arsalan [6 ]
Khan, Ilyas [7 ]
Iqbal, Sajid [3 ]
Gulzar, Yonis [4 ]
Hameed, Kauser [3 ]
机构
[1] Balochistan Univ Informat Technol Engn & Managemen, Dept Comp Engn, Quetta 87300, Pakistan
[2] Balochistan Univ IT Engn & Management Sci, Dept Informat Technol, Quetta 87300, Pakistan
[3] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Informat Syst, Al Hasa 31982, Saudi Arabia
[4] King Faisal Univ, Coll Business Adm, Dept Management Informat Syst, Al Hasa 31982, Saudi Arabia
[5] Riphah Int Univ, Coll Comp, Dept Software Engn, Faisalabad 44000, Pakistan
[6] Balochistan Univ Informat Technol Engn & Managemen, Dept Elect Engn, Quetta 87300, Pakistan
[7] Majmaah Univ, Coll Sci Al Zulfi, Dept Math, Al Majmaah 11952, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 79卷 / 01期
关键词
Authentication; cyber security; internet of things; machine-type communication devices; machine-to-machine communication; WIRELESS SENSOR NETWORKS; LIGHTWEIGHT AUTHENTICATION; SECURITY; PROTOCOL; PRIVACY; INTERNET;
D O I
10.32604/cmc.2024.048796
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine -to -machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)based infrastructure, a vital part of the fourth industrial revolution. Machine -type communication devices (MTCDs) regularly share extensive data without human intervention while making all types of decisions. These decisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeat monitoring, and several different alert systems. Many of these devices simultaneously share data to form an automated system. The data shared between machine -type communication devices (MTCDs) is prone to risk due to limited computational power, internal memory, and energy capacity. Therefore, securing the data and devices becomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions, and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data is authentication, where each device must be verified before data transmission. Several M2M authentication schemes have been proposed in the literature, however, the literature lacks a comprehensive overview of current M2M authentication techniques and the challenges associated with them. To utilize a suitable authentication scheme for specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fills this gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerning application categories, security provisions, and performance efficiency.
引用
收藏
页码:93 / 115
页数:23
相关论文
共 50 条
[31]   A Dynamic LTE Uplink Packet Scheduler for Machine-to-Machine Communication [J].
Maia, Adyson M. ;
de Castro, Miguel F. ;
Vieira, Dario .
2014 IEEE 25TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATION (PIMRC), 2014, :1609-1614
[32]   Optimizing Data Aggregation for Uplink Machine-to-Machine Communication Networks [J].
Malak, Derya ;
Dhillon, Harpreet S. ;
Andrews, Jeffrey G. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (03) :1274-1290
[33]   Statistical Dissemination Control in Large Machine-to-Machine Communication Networks [J].
Lin, Shih-Chun ;
Gu, Lei ;
Chen, Kwang-Cheng .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (04) :1897-1910
[34]   Toward a New LTE Uplink Packet Scheduler for Machine-to-Machine Communication [J].
Maia, Adyson M. ;
de Castro, Miguel F. ;
Vieira, Dario ;
Ghamri-Doudane, Yacine .
2014 BRAZILIAN SYMPOSIUM ON COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS (SBRC), 2014, :122-129
[35]   Network lifetime maximization in wireless mesh networks for machine-to-machine communication [J].
Fitzgerald, Emma ;
Pioro, Michal ;
Tomaszewski, Artur .
AD HOC NETWORKS, 2019, 95
[36]   High-Fidelity Energy-Efficient Machine-to-Machine Communication [J].
Chang, Chih-Hua ;
Chang, Ronald Y. ;
Hsieh, Hung-Yun .
2014 IEEE 25TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATION (PIMRC), 2014, :91-96
[37]   Modeling Uplink Coverage and Rate with Aggregation in Machine-to-Machine Communication Networks [J].
Malak, Derya ;
Dhillon, Harpreet S. ;
Andrews, Jeffrey G. .
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
[38]   Interoperability Between Machine-to-Machine Communication System and IP Multimedia Subsystem [J].
Cackovic, Vanesa ;
Bojic, Iva ;
Kusek, Mario .
INTEROPERABILITY AND OPEN-SOURCE SOLUTIONS FOR THE INTERNET OF THINGS, 2015, 9001 :103-117
[39]   Pairwise and Group Key Setup Mechanism for Secure Machine-to-Machine Communication [J].
Doh, Inshil ;
Lim, Jiyoung ;
Li, Shi ;
Chae, Kijoon .
COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (03) :1071-1090
[40]   Energy and bandwidth-efficient channel access for local area machine-to-machine communication [J].
Camacho-Escoto, J. J. ;
Menchaca-Mendez, Rolando ;
Menchaca-Mendez, Ricardo ;
Bernal, Jorge ;
Rivero-Angeles, Mario E. ;
Gomez, Javier ;
Garcia-Luna-Aceves, J. J. .
WIRELESS NETWORKS, 2021, 27 (01) :401-421