Authentication schemes for Internet of Things (IoT) networks: A systematic review and security assessment

被引:0
作者
Yalli, Jameel Shehu [1 ,2 ]
Hasan, Mohd Hilmi [1 ,2 ]
Jung, Low Tan [1 ]
Al-Selwi, Safwan Mahmood [1 ,2 ]
机构
[1] Univ Teknol PETRONAS, Dept Comp & Informat Sci, Seri Iskandar 32610, Perak, Malaysia
[2] Univ Teknol PETRONAS, Ctr Res Data Sci CeRDAS, Seri Iskandar 32610, Perak, Malaysia
关键词
Internet of things; IoT; Security; Authentication; Authorization; Attacks; Systematic review; Networks; USER AUTHENTICATION; KEY AGREEMENT; 3-FACTOR AUTHENTICATION; MUTUAL AUTHENTICATION; LIGHTWEIGHT; PROTOCOL; TAXONOMY; TECHNOLOGIES; CHALLENGES; PRIVACY;
D O I
10.1016/j.iot.2024.101469
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) networks are revolutionizing various aspects of our lives by enabling intelligent and automated systems. However, the proliferation of IoT devices also presents significant security challenges, particularly in terms of privacy and information security. Authentication, a fundamental security mechanism, is crucial to protecting IoT devices and the sensitive data they exchange. This work provides a comprehensive review of authentication schemes for IoT devices, analyzing their strengths, weaknesses, and security considerations. We delve into the formal and informal security evaluations of these schemes, as well as their performance metrics in terms of computational overhead, communication cost, and energy consumption. By comparing/contrasting different authentication approaches, we identify potential areas for improvement and highlight the need for robust, efficient, and secure authentication solutions tailored to the unique requirements of IoT networks. This review aims to guide IoT researchers and practitioners in developing innovative authentication schemes, particularly for resource-constrained IoT devices, that can address the evolving security landscape of IoT.
引用
收藏
页数:31
相关论文
共 166 条
  • [1] Lightweight and anonymous three-factor authentication and access control scheme for real-time applications in wireless sensor networks
    Adavoudi-Jolfaei, AmirHosein
    Ashouri-Talouki, Maede
    Aghili, Seyed Farhad
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2019, 12 (01) : 43 - 59
  • [2] Secure routing for internet of things: A survey
    Airehrour, David
    Gutierrez, Jairo
    Ray, Sayan Kumar
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 198 - 213
  • [3] Secure and dependable software defined networks
    Akhunzada, Adnan
    Gani, Abdullah
    Anuar, Nor Badrul
    Abdelaziz, Ahmed
    Khan, Muhammad Khurram
    Hayat, Amir
    Khan, Samee U.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 61 : 199 - 221
  • [4] Akinsanya M.O., 2024, Eng. Sci. Technol. J., V5, P1431
  • [5] RNN-LSTM: From applications to modeling techniques and review
    Al-Selwi, Safwan Mahmood
    Hassan, Mohd Fadzil
    Abdulkadir, Said Jadid
    Muneer, Amgad
    Sumiea, Ebrahim Hamid
    Alqushaibi, Alawi
    Ragab, Mohammed Gamal
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (05)
  • [6] An Analysis of Scheduling Scheme for QoS Guaranteed Interactive Multimedia over High Speed Wireless Campus Networks
    Alam, Md K.
    Abd Latif, Suhaimi
    Masud, Mosharrof H.
    Akter, Mahmuda
    Anwar, Farhat
    Yalli, Jameel S.
    [J]. 2013 FIRST INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION (AIMS 2013), 2013, : 421 - 427
  • [7] Comparative study on hash functions for lightweight blockchain in Internet of Things (IoT)
    Alfrhan, Aishah
    Moulahi, Tarek
    Alabdulatif, Abdulatif
    [J]. BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2021, 2 (04):
  • [8] Alhanahnah M, 2024, Arxiv, DOI arXiv:2404.11050
  • [9] Recent progress in energy harvesting systems for wearable technology
    Ali, Ahsan
    Shaukat, Hamna
    Bibi, Saira
    Altabey, Wael A.
    Noori, Mohammad
    Kouritem, Sallam A.
    [J]. ENERGY STRATEGY REVIEWS, 2023, 49
  • [10] BlockAuth: A blockchain-based framework for secure vehicle authentication and authorization
    Ali, Gauhar
    ElAffendi, Mohammed
    Ahmad, Naveed
    [J]. PLOS ONE, 2023, 18 (09):