Ashish Kumar
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
Kumar, Ashish; Saha, Rahul; Conti, Mauro; Kumar, Gulshan; Buchanan, William J.; Kim, Tai Hoon
Authors
Rahul Saha
Mauro Conti
Gulshan Kumar
Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Tai Hoon Kim
Abstract
Internet of Thing (IoT) is one of the most influential technologies in the present time. People, processes, and things are connected with the Internet through IoT. With the increasing demands of user applications, the number of connections is also increasing exponentially. Therefore, security becomes a critical issue in IoTs. Confidentiality, Integrity, and Availability (CIA) services are important for IoT applications. IoTs must also ensure proper authentication mechanisms to ensure CIA in the second stage. Various researches in this direction address the authentication issues in IoTs.
In this paper, we survey the authentication aspects in IoTs and their allied domains. We analyze the potentialities of the existing state-of-the art-approaches and also identify their limitations. We discuss the basics of authentication and its related attacks for the ease of interpretability of the readers. We show a taxonomical understanding of the approaches and try to connect the evolution of the solution strategies. These connections, to the best of our knowledge, are novel as compared to the existing authentication surveys. Besides, the multidimensional vision of this survey for IoT extensions is an add-on to the benefits. We also provide a discussion on the future direction of research in this domain. In a nutshell, this survey is a one-stop solution for academia and industry to understand the status quo of IoT authentication schemes/protocols.
Citation
Kumar, A., Saha, R., Conti, M., Kumar, G., Buchanan, W. J., & Kim, T. H. (2022). A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. Journal of Network and Computer Applications, 204, Article 103414. https://doi.org/10.1016/j.jnca.2022.103414
Journal Article Type | Article |
---|---|
Acceptance Date | Apr 28, 2022 |
Online Publication Date | May 13, 2022 |
Publication Date | 2022-08 |
Deposit Date | Jun 27, 2022 |
Journal | Journal of Network and Computer Applications |
Print ISSN | 1084-8045 |
Publisher | Elsevier |
Peer Reviewed | Peer Reviewed |
Volume | 204 |
Article Number | 103414 |
DOI | https://doi.org/10.1016/j.jnca.2022.103414 |
Keywords | Internet-of-Things, Authentication, Security, Cryptography, Research problems |
Public URL | http://researchrepository.napier.ac.uk/Output/2882236 |
You might also like
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder
(2023)
Journal Article
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search