Cargando…

Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction

With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the electric power grid or water supply systems has emerged as a major national and global priority. To address the securi...

Descripción completa

Detalles Bibliográficos
Autores principales: Istiaque Ahmed, Kazi, Tahir, Mohammad, Hadi Habaebi, Mohamed, Lun Lau, Sian, Ahad, Abdul
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8347961/
https://www.ncbi.nlm.nih.gov/pubmed/34372360
http://dx.doi.org/10.3390/s21155122
_version_ 1783735221563162624
author Istiaque Ahmed, Kazi
Tahir, Mohammad
Hadi Habaebi, Mohamed
Lun Lau, Sian
Ahad, Abdul
author_facet Istiaque Ahmed, Kazi
Tahir, Mohammad
Hadi Habaebi, Mohamed
Lun Lau, Sian
Ahad, Abdul
author_sort Istiaque Ahmed, Kazi
collection PubMed
description With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the electric power grid or water supply systems has emerged as a major national and global priority. To address the security issue of IoT, several studies are being carried out that involve the use of, but are not limited to, blockchain, artificial intelligence, and edge/fog computing. Authentication and authorization are crucial aspects of the CIA triad to protect the network from malicious parties. However, existing authorization and authentication schemes are not sufficient for handling security, due to the scale of the IoT networks and the resource-constrained nature of devices. In order to overcome challenges due to various constraints of IoT networks, there is a significant interest in using machine learning techniques to assist in the authentication and authorization process for IoT. In this paper, recent advances in authentication and authorization techniques for IoT networks are reviewed. Based on the review, we present a taxonomy of authentication and authorization schemes in IoT focusing on machine learning-based schemes. Using the presented taxonomy, a thorough analysis is provided of the authentication and authorization (AA) security threats and challenges for IoT. Furthermore, various criteria to achieve a high degree of AA resiliency in IoT implementations to enhance IoT security are evaluated. Lastly, a detailed discussion on open issues, challenges, and future research directions is presented for enabling secure communication among IoT nodes.
format Online
Article
Text
id pubmed-8347961
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-83479612021-08-08 Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction Istiaque Ahmed, Kazi Tahir, Mohammad Hadi Habaebi, Mohamed Lun Lau, Sian Ahad, Abdul Sensors (Basel) Review With the ongoing efforts for widespread Internet of Things (IoT) adoption, one of the key factors hindering the wide acceptance of IoT is security. Securing IoT networks such as the electric power grid or water supply systems has emerged as a major national and global priority. To address the security issue of IoT, several studies are being carried out that involve the use of, but are not limited to, blockchain, artificial intelligence, and edge/fog computing. Authentication and authorization are crucial aspects of the CIA triad to protect the network from malicious parties. However, existing authorization and authentication schemes are not sufficient for handling security, due to the scale of the IoT networks and the resource-constrained nature of devices. In order to overcome challenges due to various constraints of IoT networks, there is a significant interest in using machine learning techniques to assist in the authentication and authorization process for IoT. In this paper, recent advances in authentication and authorization techniques for IoT networks are reviewed. Based on the review, we present a taxonomy of authentication and authorization schemes in IoT focusing on machine learning-based schemes. Using the presented taxonomy, a thorough analysis is provided of the authentication and authorization (AA) security threats and challenges for IoT. Furthermore, various criteria to achieve a high degree of AA resiliency in IoT implementations to enhance IoT security are evaluated. Lastly, a detailed discussion on open issues, challenges, and future research directions is presented for enabling secure communication among IoT nodes. MDPI 2021-07-28 /pmc/articles/PMC8347961/ /pubmed/34372360 http://dx.doi.org/10.3390/s21155122 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Review
Istiaque Ahmed, Kazi
Tahir, Mohammad
Hadi Habaebi, Mohamed
Lun Lau, Sian
Ahad, Abdul
Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction
title Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction
title_full Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction
title_fullStr Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction
title_full_unstemmed Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction
title_short Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction
title_sort machine learning for authentication and authorization in iot: taxonomy, challenges and future research direction
topic Review
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8347961/
https://www.ncbi.nlm.nih.gov/pubmed/34372360
http://dx.doi.org/10.3390/s21155122
work_keys_str_mv AT istiaqueahmedkazi machinelearningforauthenticationandauthorizationiniottaxonomychallengesandfutureresearchdirection
AT tahirmohammad machinelearningforauthenticationandauthorizationiniottaxonomychallengesandfutureresearchdirection
AT hadihabaebimohamed machinelearningforauthenticationandauthorizationiniottaxonomychallengesandfutureresearchdirection
AT lunlausian machinelearningforauthenticationandauthorizationiniottaxonomychallengesandfutureresearchdirection
AT ahadabdul machinelearningforauthenticationandauthorizationiniottaxonomychallengesandfutureresearchdirection