Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey

被引:9
作者
Ahvanooey, Milad Taleby [1 ]
Zhu, Mark Xuefang [1 ]
Li, Qianmu [2 ,3 ]
Mazurczyk, Wojciech [4 ]
Choo, Kim-Kwang Raymond [5 ]
Gupta, Birij B. [6 ,7 ,8 ]
Conti, Mauro [9 ,10 ]
机构
[1] Nanjing Univ, Sch Informat Management, Nanjing 210023, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Cyber Sci & Engn, Nanjing 210094, Peoples R China
[3] Wuyi Univ, Sch Intelligent Mfg, Hangmen 529020, Peoples R China
[4] Warsaw Univ Technol, Inst Comp Sci, PL-00661 Warsaw, Poland
[5] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[6] Natl Inst Technol, Dept Comp Engn, Kurukshetra 136119, Haryana, India
[7] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 413, Taiwan
[8] Staffordshire Univ, Sch Digital Technol & Arts, Stoke On Trent ST4 2DE, Staffs, England
[9] Univ Padua, Dept Math, I-35131 Padua, Italy
[10] Delft Univ Technol, Fac Elect Engn Math & Comp Sci, NL-2628 CD Delft, Netherlands
关键词
Internet of Things; Passwords; Smart phones; Electronic mail; Intelligent sensors; Computer crime; Servers; Authentication schemes (ASs); biometrics; cracking attacks; graphical passwords; Internet of Things (IoT); password security; ONE-TIME PASSWORD; USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; BIOMETRIC AUTHENTICATION; MULTIMODAL APPROACH; SMART ENVIRONMENTS; DEFENSE-MECHANISMS; LIVENESS DETECTION; REPLAY ATTACKS; INTERNET;
D O I
10.1109/JIOT.2021.3138073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication remains a challenging issue, despite the existence of a large number of proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web-based, and hardware-based schemes. For example, some of these schemes are not suitable for deployment in an Internet of Things (IoT) setting, partly due to the hardware and/or software constraints of IoT devices. The increasing popularity and pervasiveness of IoT equipment in a broad range of settings reinforces the importance of ensuring the security and privacy of IoT devices. Therefore, in this article, we conduct a comprehensive literature review and an empirical study to gain an in-depth understanding of the different authentication schemes as well as their vulnerabilities and deficits against various types of cyberattacks when applied in IoT-based systems. Based on the identified limitations, we recommend several mitigation strategies and discuss the practical implications of our findings.
引用
收藏
页码:7639 / 7663
页数:25
相关论文
共 207 条
  • [1] INTERNET-OF-THINGS-BASED SMART ENVIRONMENTS: STATE OF THE ART, TAXONOMY, AND OPEN RESEARCH CHALLENGES
    Ahmed, Ejaz
    Yaqoob, Ibrar
    Gani, Abdullah
    Imran, Muhammad
    Guizani, Mohsen
    [J]. IEEE WIRELESS COMMUNICATIONS, 2016, 23 (05) : 10 - 16
  • [2] Biometric Liveness Detection: Challenges and Research Opportunities
    Akhtar, Zahid
    Micheloni, Christian
    Foresti, Gian Luca
    [J]. IEEE SECURITY & PRIVACY, 2015, 13 (05) : 63 - 72
  • [3] A review of smart home applications based on Internet of Things
    Alaa, Mussab
    Zaidan, A. A.
    Zaidan, B. B.
    Talal, Mohammed
    Kiah, M. L. M.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 97 : 48 - 65
  • [4] Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting
    Ali, Waleed
    Ahmed, Adel A.
    [J]. IET INFORMATION SECURITY, 2019, 13 (06) : 659 - 669
  • [5] allot, MASSIVE DDOS ATTACKS
  • [6] Revisiting Defenses against Large-Scale Online Password Guessing Attacks
    Alsaleh, Mansour
    Mannan, Mohammad
    van Oorschot, P. C.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (01) : 128 - 141
  • [7] Authentication of Smartphone Users Using Behavioral Biometrics
    Alzubaidi, Abdulaziz
    Kalita, Jugal
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 1998 - 2026
  • [8] Two-Factor Authentication for IoT With Location Information
    Aman, Muhammad Naveed
    Basheer, Mohamed Haroon
    Sikdar, Biplab
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 3335 - 3351
  • [9] UTravel: Smart Mobility with a Novel User Profiling and Recommendation Approach
    Amoretti, Michele
    Belli, Laura
    Zanichelli, Francesco
    [J]. PERVASIVE AND MOBILE COMPUTING, 2017, 38 : 474 - 489
  • [10] [Anonymous], IBM XFORCE THREAT IN