Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction

被引:38
作者
Istiaque Ahmed, Kazi [1 ]
Tahir, Mohammad [1 ]
Hadi Habaebi, Mohamed [2 ]
Lun Lau, Sian [1 ]
Ahad, Abdul [1 ]
机构
[1] Sunway Univ, Dept Comp & Informat Syst, Petaling Jaya 47500, Selangor, Malaysia
[2] Int Islamic Univ Malaysia, Dept Elect & Comp Engn, IoT & Wireless Commun Protocols Lab, Jalan Gombak 53100, Selangor, Malaysia
关键词
Internet of Things; IoT; security; authentication; authorization; machine learning; WIRELESS SENSOR NETWORKS; TRUST MANAGEMENT MECHANISM; ACCESS-CONTROL; SECURITY TECHNIQUES; KEY AGREEMENT; INTERNET; THINGS; SCHEME; DEVICES; LIGHTWEIGHT;
D O I
10.3390/s21155122
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the electric power grid or water supply systems has emerged as a major national and global priority. To address the security issue of IoT, several studies are being carried out that involve the use of, but are not limited to, blockchain, artificial intelligence, and edge/fog computing. Authentication and authorization are crucial aspects of the CIA triad to protect the network from malicious parties. However, existing authorization and authentication schemes are not sufficient for handling security, due to the scale of the IoT networks and the resource-constrained nature of devices. In order to overcome challenges due to various constraints of IoT networks, there is a significant interest in using machine learning techniques to assist in the authentication and authorization process for IoT. In this paper, recent advances in authentication and authorization techniques for IoT networks are reviewed. Based on the review, we present a taxonomy of authentication and authorization schemes in IoT focusing on machine learning-based schemes. Using the presented taxonomy, a thorough analysis is provided of the authentication and authorization (AA) security threats and challenges for IoT. Furthermore, various criteria to achieve a high degree of AA resiliency in IoT implementations to enhance IoT security are evaluated. Lastly, a detailed discussion on open issues, challenges, and future research directions is presented for enabling secure communication among IoT nodes.
引用
收藏
页数:34
相关论文
共 114 条
[1]  
Abdul-Ghani HA, 2018, INT J ADV COMPUT SC, V9, P355
[2]   Machine Learning in Wireless Sensor Networks: Algorithms, Strategies, and Applications [J].
Abu Alsheikh, Mohammad ;
Lin, Shaowei ;
Niyato, Dusit ;
Tan, Hwee-Pink .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1996-2018
[3]   Technologies Trend towards 5G Network for Smart Health-Care Using IoT: A Review [J].
Ahad, Abdul ;
Tahir, Mohammad ;
Aman Sheikh, Muhammad ;
Ahmed, Kazi Istiaque ;
Mughees, Amna ;
Numani, Abdullah .
SENSORS, 2020, 20 (14) :1-22
[4]   An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things [J].
Ahmed, Adel Ali ;
Ahmed, Waleed Ali .
SENSORS, 2019, 19 (17)
[5]   Secure routing for internet of things: A survey [J].
Airehrour, David ;
Gutierrez, Jairo ;
Ray, Sayan Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :198-213
[6]   Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications [J].
Al-Fuqaha, Ala ;
Guizani, Mohsen ;
Mohammadi, Mehdi ;
Aledhari, Mohammed ;
Ayyash, Moussa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04) :2347-2376
[7]  
Ali I., 2019, ARXIV190107309, V14, P456
[8]  
Alizai Zahoor Ahmed, 2018, 2018 International Conference on Applied and Engineering Mathematics (ICAEM), P115, DOI 10.1109/ICAEM.2018.8536261
[9]   An Enhanced Symmetric Cryptosystem and Biometric-Based Anonymous User Authentication and Session Key Establishment Scheme for WSN [J].
Alotaibi, Majid .
IEEE ACCESS, 2018, 6 :70072-70087
[10]   A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment [J].
Amin, Ruhul ;
Kumar, Neeraj ;
Biswas, G. P. ;
Iqbal, R. ;
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :1005-1019