Cargando…

A Survey of Internet of Things (IoT) Authentication Schemes †

The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hun...

Descripción completa

Detalles Bibliográficos
Autores principales: El-hajj, Mohammed, Fadlallah, Ahmad, Chamoun, Maroun, Serhrouchni, Ahmed
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427355/
https://www.ncbi.nlm.nih.gov/pubmed/30845760
http://dx.doi.org/10.3390/s19051141
_version_ 1783405191054229504
author El-hajj, Mohammed
Fadlallah, Ahmad
Chamoun, Maroun
Serhrouchni, Ahmed
author_facet El-hajj, Mohammed
Fadlallah, Ahmad
Chamoun, Maroun
Serhrouchni, Ahmed
author_sort El-hajj, Mohammed
collection PubMed
description The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental first step for researchers and developers addressing this domain.
format Online
Article
Text
id pubmed-6427355
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-64273552019-04-15 A Survey of Internet of Things (IoT) Authentication Schemes † El-hajj, Mohammed Fadlallah, Ahmad Chamoun, Maroun Serhrouchni, Ahmed Sensors (Basel) Article The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental first step for researchers and developers addressing this domain. MDPI 2019-03-06 /pmc/articles/PMC6427355/ /pubmed/30845760 http://dx.doi.org/10.3390/s19051141 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
El-hajj, Mohammed
Fadlallah, Ahmad
Chamoun, Maroun
Serhrouchni, Ahmed
A Survey of Internet of Things (IoT) Authentication Schemes †
title A Survey of Internet of Things (IoT) Authentication Schemes †
title_full A Survey of Internet of Things (IoT) Authentication Schemes †
title_fullStr A Survey of Internet of Things (IoT) Authentication Schemes †
title_full_unstemmed A Survey of Internet of Things (IoT) Authentication Schemes †
title_short A Survey of Internet of Things (IoT) Authentication Schemes †
title_sort survey of internet of things (iot) authentication schemes †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427355/
https://www.ncbi.nlm.nih.gov/pubmed/30845760
http://dx.doi.org/10.3390/s19051141
work_keys_str_mv AT elhajjmohammed asurveyofinternetofthingsiotauthenticationschemes
AT fadlallahahmad asurveyofinternetofthingsiotauthenticationschemes
AT chamounmaroun asurveyofinternetofthingsiotauthenticationschemes
AT serhrouchniahmed asurveyofinternetofthingsiotauthenticationschemes
AT elhajjmohammed surveyofinternetofthingsiotauthenticationschemes
AT fadlallahahmad surveyofinternetofthingsiotauthenticationschemes
AT chamounmaroun surveyofinternetofthingsiotauthenticationschemes
AT serhrouchniahmed surveyofinternetofthingsiotauthenticationschemes