Cargando…
A Survey of Internet of Things (IoT) Authentication Schemes †
The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hun...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427355/ https://www.ncbi.nlm.nih.gov/pubmed/30845760 http://dx.doi.org/10.3390/s19051141 |
_version_ | 1783405191054229504 |
---|---|
author | El-hajj, Mohammed Fadlallah, Ahmad Chamoun, Maroun Serhrouchni, Ahmed |
author_facet | El-hajj, Mohammed Fadlallah, Ahmad Chamoun, Maroun Serhrouchni, Ahmed |
author_sort | El-hajj, Mohammed |
collection | PubMed |
description | The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental first step for researchers and developers addressing this domain. |
format | Online Article Text |
id | pubmed-6427355 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-64273552019-04-15 A Survey of Internet of Things (IoT) Authentication Schemes † El-hajj, Mohammed Fadlallah, Ahmad Chamoun, Maroun Serhrouchni, Ahmed Sensors (Basel) Article The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental first step for researchers and developers addressing this domain. MDPI 2019-03-06 /pmc/articles/PMC6427355/ /pubmed/30845760 http://dx.doi.org/10.3390/s19051141 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article El-hajj, Mohammed Fadlallah, Ahmad Chamoun, Maroun Serhrouchni, Ahmed A Survey of Internet of Things (IoT) Authentication Schemes † |
title | A Survey of Internet of Things (IoT) Authentication Schemes † |
title_full | A Survey of Internet of Things (IoT) Authentication Schemes † |
title_fullStr | A Survey of Internet of Things (IoT) Authentication Schemes † |
title_full_unstemmed | A Survey of Internet of Things (IoT) Authentication Schemes † |
title_short | A Survey of Internet of Things (IoT) Authentication Schemes † |
title_sort | survey of internet of things (iot) authentication schemes † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6427355/ https://www.ncbi.nlm.nih.gov/pubmed/30845760 http://dx.doi.org/10.3390/s19051141 |
work_keys_str_mv | AT elhajjmohammed asurveyofinternetofthingsiotauthenticationschemes AT fadlallahahmad asurveyofinternetofthingsiotauthenticationschemes AT chamounmaroun asurveyofinternetofthingsiotauthenticationschemes AT serhrouchniahmed asurveyofinternetofthingsiotauthenticationschemes AT elhajjmohammed surveyofinternetofthingsiotauthenticationschemes AT fadlallahahmad surveyofinternetofthingsiotauthenticationschemes AT chamounmaroun surveyofinternetofthingsiotauthenticationschemes AT serhrouchniahmed surveyofinternetofthingsiotauthenticationschemes |