Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3102304.3102312acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

A Survey on Authentication Techniques for the Internet of Things

Published: 19 July 2017 Publication History
  • Get Citation Alerts
  • Abstract

    The Internet of Things (IoT) is the technology, which forms the foundation of today's smart and connected world. The IoT is a network used to interconnect embedded devices, such as sensors, which are able to generate, communicate and share data with one another. In such an enormous network of interconnected "smart objects", the identification of a specific object poses a fundamental task that influences all other functions of the system, such as its governance, privacy features, access control, overall architecture, etc. This paper presents a critical review of the prominent and recent authentication techniques for IoT objects. This is followed by a discussion of the limitations of current authentication techniques and future research avenues and opportunities.

    References

    [1]
    Abuarqoub, A., Hammoudeh, M., Adebisi, B., Jabbar, S., Bounceur, A., and Al-Bashar, H. (2017). Dynamic clustering and management of mobile wireless sensor networks. Computer Networks.
    [2]
    Abuarqoub, A., Hammoudeh, M., and Alsboui, T. (2012). An Overview of Information Extraction from Mobile Wireless Sensor Networks, pages 95-106. Springer Berlin Heidelberg, Berlin, Heidelberg.
    [3]
    Atzori, L., Iera, A., and Morabito, G. (2010). The internet of things: A survey. Computer Networks, 54(15):2787-2805.
    [4]
    Bounceur, . O. A. A. A. M. H. U. R. A. (2016). Unmanned ground vehicle for data collection in wireless sensor networks: Mobility-aware sink selection. The Open Automation and Control Systems Journal 8.
    [5]
    Hammoudeh, M., Al-Fayez, F., Lloyd, H., Newman, R., Adebisi, B., Bounceur, A., and Abuarqoub, A. (2017). A wireless sensor network border monitoring system: Deployment issues and routing protocols. IEEE Sensors Journal, PP(99):1-1.
    [6]
    Hammoudeh, M., Aldabbas, O., Mount, S., Abuzour, S., Alfawair, M., and Alratrout, S. (2010). Algorithmic construction of optimal and load balanced clusters in wireless sensor networks. In 2010 7th International Multi- Conference on Systems, Signals and Devices, pages 1-5.
    [7]
    Hammoudeh, M., Newman, R., Dennett, C., and Mount, S. (2013). Interpolation techniques for building a continuous map from discrete wireless sensor network data. Wireless Communications and Mobile Computing, 13(9):809-827.
    [8]
    Hummen, R., Ziegeldorf, J. H., Shafagh, H., Raza, S., and Wehrle, K. (2013). Towards viable certificate-based authentication for the internet of things. Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy - HotWiSec'13, page 37.
    [9]
    Huth, C., Zibuschka, J., Duplys, P., and Guneysu, T. (2015). Securing systems on the Internet of Things via physical properties of devices and communications. 9th Annual IEEE International Systems Conference, SysCon 2015 - Proceedings, pages 8-13.
    [10]
    Jan, M. A., Nanda, P., He, X., Tan, Z., and Liu, R. P. (2014). A robust authentication scheme for observing resources in the internet of things environment. pages 205-211.
    [11]
    Lincke, N., Kuntze, N., and Rudolph, C. (2015). Distributed security management for the iot. pages 1373-1376.
    [12]
    Liu, J., Xiao, Y., and Chen, C. L. P. (2012). Authentication and access control in the internet of things. pages 588-592.
    [13]
    Mukhopadhyay, D. (2016). PUFs as Promising Tools for Security in Internet of Things. IEEE Design and Test, 33(3):103-115.
    [14]
    Peng, S. (2012). An id-based multiple authentication scheme against attacks in wireless sensor networks. 03:1042-1045.
    [15]
    Salman, O., Abdallah, S., Elhajj, I. H., Chehab, A., and Kayssi, A. (2016). Identitybased authentication scheme for the internet of things. pages 1109-1111.
    [16]
    Shivraj, V. L., Rajan, M. A., Singh, M., and Balamuralidhar, P. (2015). One time password authentication scheme based on elliptic curves for internet of things (iot). pages 1-6.
    [17]
    Wallrabenstein, J. R. (2016). Practical and secure iot device authentication using physical unclonable functions. pages 99-106.
    [18]
    Witkovski, A., Santin, A., Abreu, V., and Marynowski, J. (2015). An idm and key-based authentication method for providing single sign-on in iot. pages 1-6.

    Cited By

    View all
    • (2024)Opportunistic Sensor-Based Authentication Factors in and for the Internet of ThingsSensors10.3390/s2414462124:14(4621)Online publication date: 17-Jul-2024
    • (2024)Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle ConnectionsIEEE Transactions on Mobile Computing10.1109/TMC.2023.327521823:4(3309-3327)Online publication date: Apr-2024
    • (2024)Hardware Security for Internet of Things Identity AssuranceIEEE Communications Surveys & Tutorials10.1109/COMST.2024.335516826:2(1041-1079)Online publication date: Oct-2025
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed Systems
    July 2017
    325 pages
    ISBN:9781450348447
    DOI:10.1145/3102304
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • LABSTICC: Labsticc

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 July 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Authentication
    2. IDM
    3. Internet of Things
    4. IoT
    5. PUF
    6. Security

    Qualifiers

    • Research-article

    Conference

    ICFNDS '17

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)108
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 27 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Opportunistic Sensor-Based Authentication Factors in and for the Internet of ThingsSensors10.3390/s2414462124:14(4621)Online publication date: 17-Jul-2024
    • (2024)Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle ConnectionsIEEE Transactions on Mobile Computing10.1109/TMC.2023.327521823:4(3309-3327)Online publication date: Apr-2024
    • (2024)Hardware Security for Internet of Things Identity AssuranceIEEE Communications Surveys & Tutorials10.1109/COMST.2024.335516826:2(1041-1079)Online publication date: Oct-2025
    • (2024)Real-Time Malicious Intrusion and Attack Detection in IoT-Enabled Cybersecurity Infrastructures2024 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI)10.1109/ACCAI61061.2024.10602405(1-5)Online publication date: 9-May-2024
    • (2024)Model-based security testing in IoT systemsInformation and Software Technology10.1016/j.infsof.2023.107326164:COnline publication date: 10-Jan-2024
    • (2023)THIS IS THE WAY!: ANALYSIS OF ARTICLES FOCUSED ON THE INTERNET OF THINGS WITH THE AIM OF EXPLAINING THE ISSUE TO EXISTING AND FUTURE RESEARCHERSEconomics & Law10.37708/el.swu.v5i1.75:1(76-104)Online publication date: 30-May-2023
    • (2023)Unleashing the Power of IoT: A Comprehensive Review of IoT Applications and Future Prospects in Healthcare, Agriculture, Smart Homes, Smart Cities, and Industry 4.0Sensors10.3390/s2316719423:16(7194)Online publication date: 16-Aug-2023
    • (2023)Authentication in Internet of Things: State of ArtProceedings of the 6th International Conference on Networking, Intelligent Systems & Security10.1145/3607720.3607723(1-6)Online publication date: 24-May-2023
    • (2023)Efficient Revocable Storage Attribute-based Encryption With Arithmetic Span Programs in Cloud-Assisted Internet of ThingsIEEE Transactions on Cloud Computing10.1109/TCC.2021.313168611:2(1273-1285)Online publication date: 1-Apr-2023
    • (2023)Lightweight Network-Based IoT Device Authentication in Cloud Services2023 IEEE 31st International Conference on Network Protocols (ICNP)10.1109/ICNP59255.2023.10355621(1-6)Online publication date: 10-Oct-2023
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media