A survey on continuous authentication methods in Internet of Things environment

被引:53
作者
Al-Naji, Fatimah Hussain [1 ]
Zagrouba, Rachid [2 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, POB 1982, Dammam 31441, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Informat Syst, POB 1982, Dammam 31441, Saudi Arabia
关键词
Internet of Things; Continuous authentication; Blockchain; User-related IoT; IoT-based CA; SECURITY; IOT; BLOCKCHAIN; PRIVACY; CHALLENGES; MANAGEMENT; FRAMEWORK; TRUST; COMMUNICATION; ARCHITECTURE;
D O I
10.1016/j.comcom.2020.09.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT environment merges the digital and physical universes and enabling them to communicate real-time data It is crucial to constantly ensure that the user is not impersonated which brings a particular type of authentication known as continuous authentication. Therefore, this survey is primary attempt to present an overview about continuous authentication methods in IoT environment, where Blockchain-related solutions provided in this context is also discussed. Subsequently, we overview IoT environment and classify IoT attacks based on its layers with the corresponding proposed countermeasures. Next, we identify a number of open issues that must be taken into account when developing authentication schemes for IoT. We further contribute to this survey by providing a comprehensive analysis of designing continuous authentication process. Besides, we highlight the primary advantages of continuous authentication over the static authentication scheme. In this context, we review relevant works that have proposed Blockchain-based solution to strength the security of IoT systems. We further contribute to present, analyze, and compare user-related IoT-based continuous authentication solutions. Also, we present the solutions that integrate Blockchain. Finally, several research directions and open challenges are identified.
引用
收藏
页码:109 / 133
页数:25
相关论文
共 159 条
[21]  
[Anonymous], 2016, Strategic Financial Management Casebook, DOI DOI 10.1109/CCIP.2016.7802880
[22]  
[Anonymous], 2017, APPROACH SOFTWARE DE
[23]  
[Anonymous], 2020, CONNECTED FUTURE
[24]  
[Anonymous], 2020, The Security and Privacy Issues that Come with the Internet of Things
[25]  
[Anonymous], 2016, P SOUTHEAST EUR DES
[26]  
[Anonymous], 2015, SURVEY SECURITY PRIV
[27]   Design and Implementation of a Contextual-Based Continuous Authentication Framework for Smart Homes [J].
Ashibani, Yosef ;
Kauling, Dylan ;
Mahmoud, Qusay H. .
APPLIED SYSTEM INNOVATION, 2019, 2 (01) :1-20
[28]  
Ashibani Y, 2017, IEEE IPCCC
[29]  
Banafa A., 2017, IEEE INTERNET THINGS
[30]   Blockchain Technology: Universal Structure and Requirements [J].
M. R. Biktimirov ;
A. V. Domashev ;
P. A. Cherkashin ;
A. Yu. Shcherbakov .
Automatic Documentation and Mathematical Linguistics, 2017, 51 (6) :235-238