A survey on continuous authentication methods in Internet of Things environment

被引:59
作者
Al-Naji, Fatimah Hussain [1 ]
Zagrouba, Rachid [2 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, POB 1982, Dammam 31441, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Informat Syst, POB 1982, Dammam 31441, Saudi Arabia
关键词
Internet of Things; Continuous authentication; Blockchain; User-related IoT; IoT-based CA; SECURITY; IOT; BLOCKCHAIN; PRIVACY; CHALLENGES; MANAGEMENT; FRAMEWORK; TRUST; COMMUNICATION; ARCHITECTURE;
D O I
10.1016/j.comcom.2020.09.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT environment merges the digital and physical universes and enabling them to communicate real-time data It is crucial to constantly ensure that the user is not impersonated which brings a particular type of authentication known as continuous authentication. Therefore, this survey is primary attempt to present an overview about continuous authentication methods in IoT environment, where Blockchain-related solutions provided in this context is also discussed. Subsequently, we overview IoT environment and classify IoT attacks based on its layers with the corresponding proposed countermeasures. Next, we identify a number of open issues that must be taken into account when developing authentication schemes for IoT. We further contribute to this survey by providing a comprehensive analysis of designing continuous authentication process. Besides, we highlight the primary advantages of continuous authentication over the static authentication scheme. In this context, we review relevant works that have proposed Blockchain-based solution to strength the security of IoT systems. We further contribute to present, analyze, and compare user-related IoT-based continuous authentication solutions. Also, we present the solutions that integrate Blockchain. Finally, several research directions and open challenges are identified.
引用
收藏
页码:109 / 133
页数:25
相关论文
共 50 条
[21]   Internet of things security: A top-down survey [J].
Kouicem, Djamel Eddine ;
Bouabdallah, Abdelmadjid ;
Lakhlef, Hicham .
COMPUTER NETWORKS, 2018, 141 :199-221
[22]   A comprehensive survey of authentication methods in Internet-of-Things and its [J].
Kumar, Ashish ;
Saha, Rahul ;
Conti, Mauro ;
Kumar, Gulshan ;
Buchanan, William J. ;
Kim, Tai Hoon .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 204
[23]   Evolution of Internet of Things From Blockchain to IOTA: A Survey [J].
Alshaikhli, Mays ;
Elfouly, Tarek ;
Elharrouss, Omar ;
Mohamed, Amr ;
Ottakath, Najmath .
IEEE ACCESS, 2022, 10 :844-866
[24]   A Survey of Internet of Things (IoT) Authentication Schemes [J].
El-hajj, Mohammed ;
Fadlallah, Ahmad ;
Chamoun, Maroun ;
Serhrouchni, Ahmed .
SENSORS, 2019, 19 (05)
[25]   A Survey on blockchain for industrial Internet of Things [J].
Kumar, R. Lakshmana ;
Khan, Firoz ;
Kadry, Seifedine ;
Rho, Seungmin .
ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (08) :6001-6022
[26]   A survey on privacy and security of Internet of Things [J].
Ogonji, Mark Mbock ;
Okeyo, George ;
Wafula, Joseph Muliaro .
COMPUTER SCIENCE REVIEW, 2020, 38
[27]   Game Theory in Internet of Things: A Survey [J].
Chi, Chuanxiu ;
Wang, Yingjie ;
Tong, Xiangrong ;
Siddula, Madhuri ;
Cai, Zhipeng .
IEEE INTERNET OF THINGS JOURNAL, 2021, 9 (14) :12125-12146
[28]   Fog Computing for the Internet of Things: A Survey [J].
Puliafito, Carlo ;
Mingozzi, Enzo ;
Longo, Francesco ;
Puliafito, Antonio ;
Rana, Omer .
ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (02)
[29]   Continuous Authentication and Authorization for the Internet of Things [J].
Shahzad, Muhammad ;
Singh, Munindar P. .
IEEE INTERNET COMPUTING, 2017, 21 (02) :86-90
[30]   Blockchain-Based Secure and Lightweight Authentication for Internet of Things [J].
Yang, Xu ;
Yang, Xuechao ;
Yi, Xun ;
Khalil, Ibrahim ;
Zhou, Xiaotong ;
He, Debiao ;
Huang, Xinyi ;
Nepal, Surya .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) :3321-3332