A survey on continuous authentication methods in Internet of Things environment

被引:53
作者
Al-Naji, Fatimah Hussain [1 ]
Zagrouba, Rachid [2 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, POB 1982, Dammam 31441, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Informat Syst, POB 1982, Dammam 31441, Saudi Arabia
关键词
Internet of Things; Continuous authentication; Blockchain; User-related IoT; IoT-based CA; SECURITY; IOT; BLOCKCHAIN; PRIVACY; CHALLENGES; MANAGEMENT; FRAMEWORK; TRUST; COMMUNICATION; ARCHITECTURE;
D O I
10.1016/j.comcom.2020.09.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT environment merges the digital and physical universes and enabling them to communicate real-time data It is crucial to constantly ensure that the user is not impersonated which brings a particular type of authentication known as continuous authentication. Therefore, this survey is primary attempt to present an overview about continuous authentication methods in IoT environment, where Blockchain-related solutions provided in this context is also discussed. Subsequently, we overview IoT environment and classify IoT attacks based on its layers with the corresponding proposed countermeasures. Next, we identify a number of open issues that must be taken into account when developing authentication schemes for IoT. We further contribute to this survey by providing a comprehensive analysis of designing continuous authentication process. Besides, we highlight the primary advantages of continuous authentication over the static authentication scheme. In this context, we review relevant works that have proposed Blockchain-based solution to strength the security of IoT systems. We further contribute to present, analyze, and compare user-related IoT-based continuous authentication solutions. Also, we present the solutions that integrate Blockchain. Finally, several research directions and open challenges are identified.
引用
收藏
页码:109 / 133
页数:25
相关论文
共 159 条
[1]  
Abusnaina A. A., 2020, ARXIV200108578
[2]   WACA: Wearable-Assisted Continuous Authentication [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Akkaya, Kemal .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, :264-269
[3]  
Adat V, 2017, 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), P2036, DOI 10.1109/ICCSP.2017.8286761
[4]  
Agrawal R, 2018, 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), P6423, DOI 10.1109/ICASSP.2018.8462513
[5]   SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things [J].
Airehrour, David ;
Gutierrez, Jairo A. ;
Ray, Sayan Kumar .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 :860-876
[6]   Continuous and transparent multimodal authentication: reviewing the state of the art [J].
Al Abdulwahid, Abdulwahid ;
Clarke, Nathan ;
Stengel, Ingo ;
Furnell, Steven ;
Reich, Christoph .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01) :455-474
[7]  
Al Abdulwahid A, 2015, PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), P1
[8]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[9]   Internet of Things security: A survey [J].
Alaba, Fadele Ayotunde ;
Othman, Mazliza ;
Hashem, Ibrahim Abaker Targio ;
Alotaibi, Faiz .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 :10-28
[10]  
Ali I., 2019, ARXIV190107309