A survey on continuous authentication methods in Internet of Things environment

被引:53
作者
Al-Naji, Fatimah Hussain [1 ]
Zagrouba, Rachid [2 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, POB 1982, Dammam 31441, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Informat Syst, POB 1982, Dammam 31441, Saudi Arabia
关键词
Internet of Things; Continuous authentication; Blockchain; User-related IoT; IoT-based CA; SECURITY; IOT; BLOCKCHAIN; PRIVACY; CHALLENGES; MANAGEMENT; FRAMEWORK; TRUST; COMMUNICATION; ARCHITECTURE;
D O I
10.1016/j.comcom.2020.09.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT environment merges the digital and physical universes and enabling them to communicate real-time data It is crucial to constantly ensure that the user is not impersonated which brings a particular type of authentication known as continuous authentication. Therefore, this survey is primary attempt to present an overview about continuous authentication methods in IoT environment, where Blockchain-related solutions provided in this context is also discussed. Subsequently, we overview IoT environment and classify IoT attacks based on its layers with the corresponding proposed countermeasures. Next, we identify a number of open issues that must be taken into account when developing authentication schemes for IoT. We further contribute to this survey by providing a comprehensive analysis of designing continuous authentication process. Besides, we highlight the primary advantages of continuous authentication over the static authentication scheme. In this context, we review relevant works that have proposed Blockchain-based solution to strength the security of IoT systems. We further contribute to present, analyze, and compare user-related IoT-based continuous authentication solutions. Also, we present the solutions that integrate Blockchain. Finally, several research directions and open challenges are identified.
引用
收藏
页码:109 / 133
页数:25
相关论文
共 50 条
  • [21] A comprehensive survey of authentication methods in Internet-of-Things and its
    Kumar, Ashish
    Saha, Rahul
    Conti, Mauro
    Kumar, Gulshan
    Buchanan, William J.
    Kim, Tai Hoon
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 204
  • [22] Internet of things security: A top-down survey
    Kouicem, Djamel Eddine
    Bouabdallah, Abdelmadjid
    Lakhlef, Hicham
    COMPUTER NETWORKS, 2018, 141 : 199 - 221
  • [23] Evolution of Internet of Things From Blockchain to IOTA: A Survey
    Alshaikhli, Mays
    Elfouly, Tarek
    Elharrouss, Omar
    Mohamed, Amr
    Ottakath, Najmath
    IEEE ACCESS, 2022, 10 : 844 - 866
  • [24] A Survey of Internet of Things (IoT) Authentication Schemes
    El-hajj, Mohammed
    Fadlallah, Ahmad
    Chamoun, Maroun
    Serhrouchni, Ahmed
    SENSORS, 2019, 19 (05)
  • [25] A Survey on blockchain for industrial Internet of Things
    Kumar, R. Lakshmana
    Khan, Firoz
    Kadry, Seifedine
    Rho, Seungmin
    ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (08) : 6001 - 6022
  • [26] A survey on privacy and security of Internet of Things
    Ogonji, Mark Mbock
    Okeyo, George
    Wafula, Joseph Muliaro
    COMPUTER SCIENCE REVIEW, 2020, 38
  • [27] Game Theory in Internet of Things: A Survey
    Chi, Chuanxiu
    Wang, Yingjie
    Tong, Xiangrong
    Siddula, Madhuri
    Cai, Zhipeng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14) : 12125 - 12146
  • [28] Fog Computing for the Internet of Things: A Survey
    Puliafito, Carlo
    Mingozzi, Enzo
    Longo, Francesco
    Puliafito, Antonio
    Rana, Omer
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (02)
  • [29] Continuous Authentication and Authorization for the Internet of Things
    Shahzad, Muhammad
    Singh, Munindar P.
    IEEE INTERNET COMPUTING, 2017, 21 (02) : 86 - 90
  • [30] Blockchain-Based Secure and Lightweight Authentication for Internet of Things
    Yang, Xu
    Yang, Xuechao
    Yi, Xun
    Khalil, Ibrahim
    Zhou, Xiaotong
    He, Debiao
    Huang, Xinyi
    Nepal, Surya
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) : 3321 - 3332