A comprehensive survey on authentication and secure key management in internet of things: Challenges, countermeasures, and future directions

被引:35
作者
Rao, Patruni Muralidhara [1 ]
Deebak, B. D. [1 ,2 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, India
[2] Gachon Univ, Dept Comp Engn, Seongnam 13120, South Korea
关键词
Security and privacy; Authentication; Key-management; Internet of things; Network Models; WIRELESS SENSOR NETWORKS; 2-FACTOR USER AUTHENTICATION; EFFICIENT MUTUAL AUTHENTICATION; AGREEMENT SCHEME; LIGHTWEIGHT AUTHENTICATION; 3-FACTOR AUTHENTICATION; PRIVACY PRESERVATION; INTRUSION DETECTION; IOT; PROTOCOL;
D O I
10.1016/j.adhoc.2023.103159
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical infrastructures such as healthcare, intelligent transportation, and home automation adapt billions of smart IoT devices to handle real-time data effectively in the digital era. The latest development in sensory and communication technologies collaborate directly with modern applications to bridge networking services without human intervention. Most information systems enable the extension of digital technology to demonstrate the potential use of next-generation network services and management. However, recent advancements open various opportunities, including repudiation, data tampering, and security threats in digital security and privacy. Thus, this survey article chooses a systematic literature review to present a comprehensive survey on authentication and key management in IoT. To discuss the major issues involved in IoT environments, this survey categorizes the work progress into four modules: 1. Discuss the broad aspects of convergence technologies, including healthcare, smart farming, intelligent transportation, etc., to address challenges such as security and privacy in IoT; 2. Conduct a comprehensive review of state-of-the-art technologies to identify security requirements, services, and challenges associated with modern IoT applications; 3. Present a systematic approach to review various key agreement schemes based on network models and performance analysis to examine potential vulnerabilities. 4. Show a thematic analysis to determine suitable corrective measurements dealing with various security and privacy issues. Finally, this paper rationalizes significant progress, including research challenges and future directions in IoT to promote new insights.
引用
收藏
页数:31
相关论文
共 211 条
[1]   Secure routing for internet of things: A survey [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :198-213
[2]  
Al-Turjman F., COMPLEX INTELL SYST, P1
[3]   Seamless Authentication: For IoT-Big Data Technologies in Smart Industrial Application Systems [J].
AL-Turjman, Fadi ;
Deebak, B. D. .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (04) :2919-2927
[4]   Energy Aware Resource Allocation in Multi-Hop Multimedia Routing via the Smart Edge Device [J].
Al-Turjman, Fadi ;
Deebak, B. D. ;
Mostarda, Leonardo .
IEEE ACCESS, 2019, 7 :151203-151214
[5]   Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks [J].
Al-Turjman, Fadi ;
Ever, Yoney Kirsal ;
Ever, Enver ;
Nguyen, Huan X. ;
David, Deebak Bakkiam .
IEEE ACCESS, 2017, 5 :24617-24631
[6]   A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring [J].
Ali, Rifaqat ;
Pal, Arup Kumar ;
Kumari, Saru ;
Karuppiah, Marimuthu ;
Conti, Mauro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 84 :200-215
[7]   An Attack-Resilient Architecture for the Internet of Things [J].
Almohri, Hussain M. J. ;
Watson, Layne T. ;
Evans, David .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :3940-3954
[8]   A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment [J].
Amin, Ruhul ;
Kumar, Neeraj ;
Biswas, G. P. ;
Iqbal, R. ;
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :1005-1019
[9]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[10]   Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Leng, Lu ;
Kumar, Neeraj .
COMPUTER NETWORKS, 2016, 101 :42-62