Skip to main content

Research Repository

Advanced Search

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions

Kumar, Ashish; Saha, Rahul; Conti, Mauro; Kumar, Gulshan; Buchanan, William J.; Kim, Tai Hoon

Authors

Ashish Kumar

Rahul Saha

Mauro Conti

Gulshan Kumar

Tai Hoon Kim



Abstract

Internet of Thing (IoT) is one of the most influential technologies in the present time. People, processes, and things are connected with the Internet through IoT. With the increasing demands of user applications, the number of connections is also increasing exponentially. Therefore, security becomes a critical issue in IoTs. Confidentiality, Integrity, and Availability (CIA) services are important for IoT applications. IoTs must also ensure proper authentication mechanisms to ensure CIA in the second stage. Various researches in this direction address the authentication issues in IoTs.

In this paper, we survey the authentication aspects in IoTs and their allied domains. We analyze the potentialities of the existing state-of-the art-approaches and also identify their limitations. We discuss the basics of authentication and its related attacks for the ease of interpretability of the readers. We show a taxonomical understanding of the approaches and try to connect the evolution of the solution strategies. These connections, to the best of our knowledge, are novel as compared to the existing authentication surveys. Besides, the multidimensional vision of this survey for IoT extensions is an add-on to the benefits. We also provide a discussion on the future direction of research in this domain. In a nutshell, this survey is a one-stop solution for academia and industry to understand the status quo of IoT authentication schemes/protocols.

Journal Article Type Article
Acceptance Date Apr 28, 2022
Online Publication Date May 13, 2022
Publication Date 2022-08
Deposit Date Jun 27, 2022
Journal Journal of Network and Computer Applications
Print ISSN 1084-8045
Publisher Elsevier
Peer Reviewed Peer Reviewed
Volume 204
Article Number 103414
DOI https://doi.org/10.1016/j.jnca.2022.103414
Keywords Internet-of-Things, Authentication, Security, Cryptography, Research problems
Public URL http://researchrepository.napier.ac.uk/Output/2882236