Review on Security of Internet of Things Authentication Mechanism

Nandy, Tarak and Idris, Mohd Yamani Idna and Noor, Rafidah Md and Mat Kiah, Miss Laiha and Lau, Sian Lun and Anuar, Nor Badrul and Ahmedy, Ismail and Ghani, Norjihan Abdul and Bhattacharyya, Sananda (2019) Review on Security of Internet of Things Authentication Mechanism. IEEE Access, 7. pp. 151054-151089. ISSN 2169-3536

Full text not available from this repository.
Official URL: https://doi.org/10.1109/ACCESS.2019.2947723

Abstract

Internet of things (IoT) is considered as a collection of heterogeneous devices, such as sensors, Radio-frequency identification (RFID) and actuators, which form a huge network, enabling non-internet components in the network to produce a better world of services, like smart home, smart city, smart transportation, and smart industries. On the other hand, security and privacy are the most important aspects of the IoT network, which includes authentication, authorization, data protection, network security, and access control. Additionally, traditional network security cannot be directly used in IoT networks due to its limitations on computational capabilities and storage capacities. Furthermore, authentication is the mainstay of the IoT network, as all components undergo an authentication process before establishing communication. Therefore, securing authentication is essential. In this paper, we have focused on IoT security particularly on their authentication mechanisms. Consequently, we highlighted enormous attacks and technical methods on the IoT authentication mechanism. Additionally, we discussed existing security verification techniques and evaluation schemes of IoT authentication. Furthermore, analysis against current existing protocols have been discussed in all parts and provided some recommendation. Finally, the aim of our study is to help the future researcher by providing security issues, open challenges and future scopes in IoT authentication. © 2013 IEEE.

Item Type: Article
Uncontrolled Keywords: Authentication; authentication protocols; Internet of Things; network attacks; security; wireless sensor network
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Faculty of Computer Science & Information Technology
Depositing User: Ms. Juhaida Abd Rahim
Date Deposited: 03 Dec 2019 02:52
Last Modified: 21 Feb 2020 01:43
URI: http://eprints.um.edu.my/id/eprint/23184

Actions (login required)

View Item View Item