Mohamed Amine Ferrag
Authentication Protocols for Internet of Things: A Comprehensive Survey
Ferrag, Mohamed Amine; Maglaras, Leandros A.; Janicke, Helge; Jiang, Jianmin; Shu, Lei
Authors
Prof Leandros Maglaras L.Maglaras2@napier.ac.uk
Visiting Professor
Helge Janicke
Jianmin Jiang
Lei Shu
Abstract
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.
Citation
Ferrag, M. A., Maglaras, L. A., Janicke, H., Jiang, J., & Shu, L. (2017). Authentication Protocols for Internet of Things: A Comprehensive Survey. Security and Communication Networks, 2017, Article 6562953. https://doi.org/10.1155/2017/6562953
Journal Article Type | Article |
---|---|
Acceptance Date | Sep 28, 2017 |
Online Publication Date | Nov 6, 2017 |
Publication Date | Nov 6, 2017 |
Deposit Date | Jan 4, 2023 |
Publicly Available Date | Jan 6, 2023 |
Journal | Security and Communication Networks |
Print ISSN | 1939-0114 |
Electronic ISSN | 1939-0122 |
Publisher | Wiley |
Peer Reviewed | Peer Reviewed |
Volume | 2017 |
Article Number | 6562953 |
DOI | https://doi.org/10.1155/2017/6562953 |
Keywords | Internet of Things, Taxonomy, Architecture, Protocol (computers), Internet of Vehicles, Security, Privacy, Internet access, Access control, Sensors |
Public URL | http://researchrepository.napier.ac.uk/Output/2969615 |
Files
Authentication Protocols for Internet of Things: A Comprehensive Survey
(3.2 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by/4.0/
Copyright Statement
CC BY 4.0
You might also like
Post-Quantum ZKP for Privacy-Preserving Authentication and Model Verification in Decentralized CAV
(2025)
Presentation / Conference Contribution
A Blockchain-Powered Defence System Against DDoS Attacks with Incentivised Collaboration
(2025)
Presentation / Conference Contribution
Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems
(2025)
Presentation / Conference Contribution
ARSecure: A Novel End-to-End Encryption Messaging System Using Augmented Reality
(2025)
Presentation / Conference Contribution
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search