Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3102304.3102312acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

A Survey on Authentication Techniques for the Internet of Things

Published: 19 July 2017 Publication History

Abstract

The Internet of Things (IoT) is the technology, which forms the foundation of today's smart and connected world. The IoT is a network used to interconnect embedded devices, such as sensors, which are able to generate, communicate and share data with one another. In such an enormous network of interconnected "smart objects", the identification of a specific object poses a fundamental task that influences all other functions of the system, such as its governance, privacy features, access control, overall architecture, etc. This paper presents a critical review of the prominent and recent authentication techniques for IoT objects. This is followed by a discussion of the limitations of current authentication techniques and future research avenues and opportunities.

References

[1]
Abuarqoub, A., Hammoudeh, M., Adebisi, B., Jabbar, S., Bounceur, A., and Al-Bashar, H. (2017). Dynamic clustering and management of mobile wireless sensor networks. Computer Networks.
[2]
Abuarqoub, A., Hammoudeh, M., and Alsboui, T. (2012). An Overview of Information Extraction from Mobile Wireless Sensor Networks, pages 95-106. Springer Berlin Heidelberg, Berlin, Heidelberg.
[3]
Atzori, L., Iera, A., and Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15):2787-2805.
[4]
Bounceur, . O. A. A. A. M. H. U. R. A. (2016). Unmanned ground vehicle for data collection in wireless sensor networks: Mobility-aware sink selection. The Open Automation and Control Systems Journal 8.
[5]
Hammoudeh, M., Al-Fayez, F., Lloyd, H., Newman, R., Adebisi, B., Bounceur, A., and Abuarqoub, A. (2017). A wireless sensor network border monitoring system: Deployment issues and routing protocols. IEEE Sensors Journal, PP(99):1-1.
[6]
Hammoudeh, M., Aldabbas, O., Mount, S., Abuzour, S., Alfawair, M., and Alratrout, S. (2010). Algorithmic construction of optimal and load balanced clusters in wireless sensor networks. In 2010 7th International Multi- Conference on Systems, Signals and Devices, pages 1-5.
[7]
Hammoudeh, M., Newman, R., Dennett, C., and Mount, S. (2013). Interpolation techniques for building a continuous map from discrete wireless sensor network data. Wireless Communications and Mobile Computing, 13(9):809-827.
[8]
Hummen, R., Ziegeldorf, J. H., Shafagh, H., Raza, S., and Wehrle, K. (2013). Towards viable certificate-based authentication for the internet of things. Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy - HotWiSec'13, page 37.
[9]
Huth, C., Zibuschka, J., Duplys, P., and Guneysu, T. (2015). Securing systems on the Internet of Things via physical properties of devices and communications. 9th Annual IEEE International Systems Conference, SysCon 2015 - Proceedings, pages 8-13.
[10]
Jan, M. A., Nanda, P., He, X., Tan, Z., and Liu, R. P. (2014). A robust authentication scheme for observing resources in the internet of things environment. pages 205-211.
[11]
Lincke, N., Kuntze, N., and Rudolph, C. (2015). Distributed security management for the iot. pages 1373-1376.
[12]
Liu, J., Xiao, Y., and Chen, C. L. P. (2012). Authentication and access control in the internet of things. pages 588-592.
[13]
Mukhopadhyay, D. (2016). PUFs as Promising Tools for Security in Internet of Things. IEEE Design and Test, 33(3):103-115.
[14]
Peng, S. (2012). An id-based multiple authentication scheme against attacks in wireless sensor networks. 03:1042-1045.
[15]
Salman, O., Abdallah, S., Elhajj, I. H., Chehab, A., and Kayssi, A. (2016). Identitybased authentication scheme for the internet of things. pages 1109-1111.
[16]
Shivraj, V. L., Rajan, M. A., Singh, M., and Balamuralidhar, P. (2015). One time password authentication scheme based on elliptic curves for internet of things (iot). pages 1-6.
[17]
Wallrabenstein, J. R. (2016). Practical and secure iot device authentication using physical unclonable functions. pages 99-106.
[18]
Witkovski, A., Santin, A., Abreu, V., and Marynowski, J. (2015). An idm and key-based authentication method for providing single sign-on in iot. pages 1-6.

Cited By

View all
  • (2024)Opportunistic Sensor-Based Authentication Factors in and for the Internet of ThingsSensors10.3390/s2414462124:14(4621)Online publication date: 17-Jul-2024
  • (2024)Performance Analysis of Authentication System: A Systematic Literature ReviewRecent Advances in Computer Science and Communications10.2174/012666255824653123112111551417:7Online publication date: Oct-2024
  • (2024)IoT Authentication Protocols: Challenges, and Comparative AnalysisACM Computing Surveys10.1145/3703444Online publication date: 30-Nov-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed Systems
July 2017
325 pages
ISBN:9781450348447
DOI:10.1145/3102304
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • LABSTICC: Labsticc

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 July 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Authentication
  2. IDM
  3. Internet of Things
  4. IoT
  5. PUF
  6. Security

Qualifiers

  • Research-article

Conference

ICFNDS '17

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)88
  • Downloads (Last 6 weeks)14
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Opportunistic Sensor-Based Authentication Factors in and for the Internet of ThingsSensors10.3390/s2414462124:14(4621)Online publication date: 17-Jul-2024
  • (2024)Performance Analysis of Authentication System: A Systematic Literature ReviewRecent Advances in Computer Science and Communications10.2174/012666255824653123112111551417:7Online publication date: Oct-2024
  • (2024)IoT Authentication Protocols: Challenges, and Comparative AnalysisACM Computing Surveys10.1145/3703444Online publication date: 30-Nov-2024
  • (2024)Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle ConnectionsIEEE Transactions on Mobile Computing10.1109/TMC.2023.327521823:4(3309-3327)Online publication date: Apr-2024
  • (2024)Hardware Security for Internet of Things Identity AssuranceIEEE Communications Surveys & Tutorials10.1109/COMST.2024.335516826:2(1041-1079)Online publication date: Oct-2025
  • (2024)Real-Time Malicious Intrusion and Attack Detection in IoT-Enabled Cybersecurity Infrastructures2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)10.1109/ACCAI61061.2024.10602405(1-5)Online publication date: 9-May-2024
  • (2024)Model-based security testing in IoT systemsInformation and Software Technology10.1016/j.infsof.2023.107326164:COnline publication date: 10-Jan-2024
  • (2023)THIS IS THE WAY!: ANALYSIS OF ARTICLES FOCUSED ON THE INTERNET OF THINGS WITH THE AIM OF EXPLAINING THE ISSUE TO EXISTING AND FUTURE RESEARCHERSEconomics & Law10.37708/el.swu.v5i1.75:1(76-104)Online publication date: 30-May-2023
  • (2023)Unleashing the Power of IoT: A Comprehensive Review of IoT Applications and Future Prospects in Healthcare, Agriculture, Smart Homes, Smart Cities, and Industry 4.0Sensors10.3390/s2316719423:16(7194)Online publication date: 16-Aug-2023
  • (2023)Authentication in Internet of Things: State of ArtProceedings of the 6th International Conference on Networking, Intelligent Systems & Security10.1145/3607720.3607723(1-6)Online publication date: 24-May-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media