Systematic Review of Authentication and Authorization Advancements for the Internet of Things
Abstract
:1. Introduction
1.1. Background
- With which participants can data be shared?
- Which participants can be interacted with?
- What is the best way to authenticate participants?
- What is the best way to detect a malicious node?
- What is the best way to introduce a new device into the network?
- What is the best way to retire the device, and when should this be done?
1.2. Motivation and Contribution
- (1)
- What does current IoT authentication and authorization research look like?
- (2)
- What are the common properties of IoT application-layer authentication and authorization solutions?
- (3)
- How can a general researchers grasp the main trend of this area quickly?
- We offer a useful roadmap of analyzed and distilled key information from recent 1622 peer-reviewed articles located at major academic sources. Unlike previous surveys and reviews focusing on the specific theme of IoT security, our work provides a blueprint to the general readers without much relevant background working in this area.
- Since the IoT application layer includes application-specific vulnerabilities such as authentication, authorization, identification, data management, and information privacy, we position this systematic review primarily concerning the taxonomy of security solutions, context-aware solutions adopted standards, and the distributed vs. centralized nature of given approaches and specific interactions.
2. Goals
- RQ1
- What is the taxonomy of security solutions?
- RQ2
- Which topologies, communication types, and perspectives are most dominant in the authentication and authorization IoT research?
- RQ3
- What are the applicability domains and requirements of identified solutions?
3. Literature Identification
3.1. Inclusion and Exclusion Criteria
- Published between October 2017 and 2020 (both inclusive).
- Indexed by either IEEE Xplore, ACM DL, WoS SCIE, SpringerLink, or ScienceDirect.
- Relates to authentication, authorization, identity management, or access control for IoT. In particular, we considered whether the publication proposed a solution to considered topics.
- Not written in English.
- Duplicate publication.
- Published before October 2017 (considering our previous survey time scope [6]).
- Less than four pages.
- Could not determine the technical objective (mainly because of poor English).
- Not in the scope of the application layer, i.e., focused on security on the lower level of the network stack.
- Survey or opinion publication without explicit technical contribution.
- Utilized blockchain technology.
3.2. Searched and Filtered Results
3.3. Property Coding
4. Taxonomy and Trends
- Years-based Taxonomy.
- Goals-based Taxonomy.
- Automation-based Taxonomy.
- The three-year perspective trends.
4.1. Years Based Taxonomy
4.2. Goals-based Taxonomy
- Context-awareness (yes/no): the ability of a system to gather information about its environment at any given time and adapt behaviors accordingly.
- Centralized vs. decentralized network topology (centralized/decentralized/both or N/A): the solution topology could require either centralization, decentralization, or combination between such elements.
- Communication model (M2M/U2M/both or N/A): the different communication methods in terms of the machine-to-machine (M2M) or user-to-machine (U2M), which strictly require some user input information.
- Existing vs. new method (existing, new, extension): the novelty of the method. It is unusual for solutions to be novel as a whole. It is common to reuse existing technology in novel ways.
4.3. Automation Based Taxonomy
4.4. The Three-Year Perspective Trends
5. Details on Goal-Based Taxonomy Perspectives
5.1. Context-Awareness
5.2. Distributed vs. Centralized Network Topology
5.3. Communication Model
5.4. Existing versus New Methods
5.5. Domains and Constraints Used in Research of Security Solutions
6. Threats to Validity
7. Answers to Research Questions
- RQ1 What is the taxonomy of security solutions?
- RQ2 What topologies, communication types, and perspectives are most dominant in the authentication and authorization IoT research?
- RQ3 What are the applicability domains and requirements of identified solutions?
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
IoT | Internet of things |
RQ | Research question |
WoS | Web of Science |
SCIE | Science Citation Index Expanded |
ACM DL | Association for Computing Machinery digital library |
M2M | Machine to machine |
U2M | User to machine |
ABAC | Attribute-based access control |
RBAC | Role-based access control |
JWT | JSON web token |
GPS | Global positioning system |
PC | Personal computer |
CBAC | Capability-based access control |
RFID | Radio-frequency identification |
References
- Loi, F.; Sivanathan, A.; Gharakheili, H.H.; Radford, A.; Sivaraman, V. Systematically Evaluating Security and Privacy for Consumer IoT Devices. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy (IoTS&P ’17); Association for Computing Machinery: New York, NY, USA, 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Anderson, R.; Moore, T. The Economics of Information Security. Science 2006, 314, 610–613. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Atzori, L.; Iera, A.; Morabito, G. The Internet of Things: A survey. Comput. Netw. 2010, 54, 2787–2805. [Google Scholar] [CrossRef]
- Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J. Netw. Comput. Appl. 2017, 88, 10–28. [Google Scholar] [CrossRef]
- binti Mohamad Noor, M.; Hassan, W.H. Current research on Internet of Things (IoT) security: A survey. Comput. Netw. 2019, 148, 283–294. [Google Scholar] [CrossRef]
- Trnka, M.; Cerny, T.; Stickney, N. Survey of Authentication and Authorization for the Internet of Things. Secur. Commun. Netw. 2018, 2018, 4351603. [Google Scholar] [CrossRef] [Green Version]
- Miloslavskaya, N.; Tolstoy, A. Internet of Things: Information security challenges and solutions. Clust. Comput. 2019, 22, 103–119. [Google Scholar] [CrossRef]
- Chanal, P.M.; Kakkasageri, M.S. Security and Privacy in IoT: A Survey. Wirel. Pers. Commun. 2020, 115, 1667–1693. [Google Scholar] [CrossRef]
- Al-Naji, F.H.; Zagrouba, R. A survey on continuous authentication methods in Internet of Things environment. Comput. Commun. 2020, 163, 109–133. [Google Scholar] [CrossRef]
- Tange, K.; De Donno, M.; Fafoutis, X.; Dragoni, N. A Systematic Survey of Industrial Internet of Things Security: Requirements and Fog Computing Opportunities. IEEE Commun. Surv. Tutorials 2020, 22, 2489–2520. [Google Scholar] [CrossRef]
- Ibrahim, S.; Shukla, V.K.; Bathla, R. Security Enhancement in Smart Home Management Through Multimodal Biometric and Passcode. In Proceedings of the 2020 International Conference on Intelligent Engineering and Management (ICIEM), London, UK, 17–19 June 2020; pp. 420–424. [Google Scholar] [CrossRef]
- Baruah, B.; Dhal, S. An Efficient Authentication Scheme for Secure Communication between Industrial IoT Devices. In Proceedings of the 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India, 1–3 July 2020; pp. 1–7. [Google Scholar] [CrossRef]
- Zulkipli, N.H.N.; Wills, G.B. An Event-Based Access Control for IoT. In Proceedings of the Second International Conference on Internet of Things, Data and Cloud Computing (ICC ’17); Association for Computing Machinery: New York, NY, USA, 2017. [Google Scholar] [CrossRef]
- Chen, Y.Y.; Chen, C.L.; Lin, C.L.; Chiang, C.T. Application of ECG Authentication in IoT-Based Systems. In Proceedings of the 2018 International Conference on System Science and Engineering (ICSSE), New Taipei City, Taiwan, 28–30 June 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Kashmar, N.; Adda, M.; Atieh, M.; Ibrahim, H. A New Dynamic Smart-AC Model Methodology to Enforce Access Control Policy in IoT Layers. In Proceedings of the 1st International Workshop on Software Engineering Research & Practices for the Internet of Things (SERP4IoT ’19), Montreal, QC, Canada, 27 May 2019; pp. 21–24. [Google Scholar] [CrossRef]
- Karimibiuki, M.; Aggarwal, E.; Pattabiraman, K.; Ivanov, A. DynPolAC: Dynamic Policy-Based Access Control for IoT Systems. In Proceedings of the 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), Taipei, Taiwan, 4–8 December 2018; pp. 161–170. [Google Scholar] [CrossRef]
- Chen, H.C.; Chang, C.H.; Leu, F.Y. Implement of agent with role-based hierarchy access control for secure grouping IoTs. In Proceedings of the 2017 14th IEEE Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2017; pp. 120–125. [Google Scholar] [CrossRef]
- Olazabal, O.; Gofman, M.; Bai, Y.; Choi, Y.; Sandico, N.; Mitra, S.; Pham, K. Multimodal Biometrics for Enhanced IoT Security. In Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 7–9 January 2019; pp. 0886–0893. [Google Scholar] [CrossRef]
- Terkawi, A.; Innab, N.; al Amri, S.; Al-Amri, A. Internet of Things (IoT) Increasing the Necessity to Adopt Specific Type of Access Control Technique. In Proceedings of the 2018 21st Saudi Computer Society National Computer Conference (NCC), Riyadh, Saudi Arabia, 25–26 April 2018; pp. 1–5. [Google Scholar] [CrossRef]
- Hoang, N.M.; Son, H.X. A Dynamic Solution for Fine-Grained Policy Conflict Resolution. In Proceedings of the 3rd International Conference on Cryptography, Security and Privacy (ICCSP ’19); Association for Computing Machinery: New York, NY, USA, 2019; pp. 116–120. [Google Scholar] [CrossRef]
- Cattermole, T.; Docherty, S.; Pym, D.; Sasse, M.A. Asset-Oriented Access Control: Towards a New IoT Framework. In Proceedings of the 9th International Conference on the Internet of Things (IoT 2019); Association for Computing Machinery: New York, NY, USA, 2019. [Google Scholar] [CrossRef]
- Mathew, S.; Saranya, G. Advanced biometric home security system using digital signature and DNA cryptography. In Proceedings of the 2017 International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT), Coimbatore, India, 16–18 March 2017; pp. 1–4. [Google Scholar] [CrossRef]
- Jain, P.; Pötter, H.; Lee, A.J.; Mósse, D. MAFIA: Multi-layered Architecture For IoT-based Authentication. In Proceedings of the 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), Atlanta, GA, USA, 28–31 October 2020; pp. 199–208. [Google Scholar] [CrossRef]
- Guo, Y.; Zhang, Z.; Guo, Y. Fog-Centric Authenticated Key Agreement Scheme Without Trusted Parties. IEEE Syst. J. 2020, 15, 5057–5066. [Google Scholar] [CrossRef]
- Renuka, K.M.; Kumari, S.; Zhao, D.; Li, L. Design of a Secure Password-Based Authentication Scheme for M2M Networks in IoT Enabled Cyber-Physical Systems. IEEE Access 2019, 7, 51014–51027. [Google Scholar] [CrossRef]
- Kim, Y.; Nam, J.; Park, T.; Scott-Hayward, S.; Shin, S. SODA: A software-defined security framework for IoT environments. Comput. Netw. 2019, 163, 106889. [Google Scholar] [CrossRef]
- Felde, N.g.; Grundner-Culemann, S.; Guggemos, T. Authentication in dynamic groups using identity-based signatures. In Proceedings of the 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Limassol, Cyprus, 15–17 October 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Mahbub, T.N.; Reza, S.M.S.; Hossain, D.A.; Raju, M.H.; Arifeen, M.M.; Ayob, A. ANFIS Based Authentication Performance Evaluation for Enhancing Security in Internet of Things. In Proceedings of the International Conference on Computing Advancements (ICCA 2020); Association for Computing Machinery: New York, NY, USA, 2020. [Google Scholar] [CrossRef]
- Heydari, M.; Mylonas, A.; Katos, V.; Balaguer-Ballester, E.; Tafreshi, V.H.F.; Benkhelifa, E. Uncertainty-Aware Authentication Model for Fog Computing in IoT. In Proceedings of the 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC), Rome, Italy, 10–13 June 2019; pp. 52–59. [Google Scholar] [CrossRef] [Green Version]
- Ning, Z.; Xu, G.; Xiong, N.; Yang, Y.; Shen, C.; Panaousis, E.; Wang, H.; Liang, K. TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things. IEEE Access 2019, 7, 30112–30125. [Google Scholar] [CrossRef]
- Leung, H.M.C.; Fu, C.W.; Heng, P.A. TwistIn: Tangible Authentication of Smart Devices via Motion Co-Analysis with a Smartwatch. In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies; ACM: New York, NY, USA, 2018; Volume 2, pp. 1–24. [Google Scholar] [CrossRef]
- Burakgazi Bilgen, M.; Bicakci, K. Extending Attribute-Based Access Control Model with Authentication Information for Internet of Things. In Proceedings of the 2020 International Conference on Information Security and Cryptology (ISCTURKEY), Ankara, Turkey, 3–4 December 2020; pp. 48–55. [Google Scholar] [CrossRef]
- Oh, S.R.; Kim, Y.G.; Cho, S. An Interoperable Access Control Framework for Diverse IoT Platforms Based on OAuth and Role. Sensors 2019, 19, 1884. [Google Scholar] [CrossRef] [Green Version]
- Dammak, M.; Boudia, O.R.M.; Messous, M.A.; Senouci, S.M.; Gransart, C. Token-Based Lightweight Authentication to Secure IoT Networks. In Proceedings of the 2019 16th IEEE Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2019; pp. 1–4. [Google Scholar] [CrossRef]
- Nespoli, P.; Zago, M.; Celdran, A.H.; Perez, M.G.; Marmol, F.G.; Garcia Clernente, F.J. A Dynamic Continuous Authentication Framework in IoT-Enabled Environments. In Proceedings of the 2018 Fifth International Conference on Internet of Things: Systems, Management and Security, Valencia, Spain, 15–18 October 2018; pp. 131–138. [Google Scholar] [CrossRef]
- Rothe, L.; Loske, M.; Gertler, D.G. Proposing Context-Aware Authentication for the Industrial Internet of Things. In Proceedings of the 2018 IEEE Global Conference on Internet of Things (GCIoT), Alexandria, Egypt, 5–7 December 2018; pp. 1–5. [Google Scholar] [CrossRef]
- Ouaddah, A.; Mousannif, H.; Abou Elkalam, A.; Ait Ouahman, A. Access control in the Internet of Things: Big challenges and new opportunities. Comput. Netw. 2017, 112, 237–262. [Google Scholar] [CrossRef]
- Yan, H.; Wang, Y.; Jia, C.; Li, J.; Xiang, Y.; Pedrycz, W. IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT. Future Gener. Comput. Syst. 2019, 95, 344–353. [Google Scholar] [CrossRef]
- Chiu, W.; Su, C.; Fan, C.Y.; Chen, C.M.; Yeh, K.H. Authentication with What You See and Remember in the Internet of Things. Symmetry 2018, 10, 537. [Google Scholar] [CrossRef] [Green Version]
- Phoka, T.; Phetsrikran, T.; Massagram, W. Dynamic Keypad Security System with Key Order Scrambling Technique and OTP Authentication. In Proceedings of the 2018 22nd International Computer Science and Engineering Conference (ICSEC), Chiang Mai, Thailand, 21–24 November 2018; pp. 1–4. [Google Scholar] [CrossRef]
- Heydari, M.; Mylonas, A.; Tafreshi, V.H.F.; Benkhelifa, E.; Singh, S. Known unknowns: Indeterminacy in authentication in IoT. Future Gener. Comput. Syst. 2020, 111, 278–287. [Google Scholar] [CrossRef]
- Malavizhi, N.; Selarani, N.; Raj, P. Adaptive fuzzy genetic algorithm for multi biometric authentication. Multimed Tools Appl. 2020, 79, 9131–9144. [Google Scholar] [CrossRef]
- Sharif, M.; Mercelis, S.; Van Den Bergh, W.; Hellinckx, P. Towards Real-Time Smart Road Construction: Efficient Process Management through the Implementation of Internet of Things. In Proceedings of the International Conference on Big Data and Internet of Thing (BDIOT2017); Association for Computing Machinery: New York, NY, USA, 2017; pp. 174–180. [Google Scholar] [CrossRef]
- Ashibani, Y.; Kauling, D.; Mahmoud, Q.H. A context-aware authentication framework for smart homes. In Proceedings of the 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), Windsor, ON, Canada, 30 April–3 May 2017; pp. 1–5. [Google Scholar] [CrossRef]
- Ulz, T.; Pieber, T.; Steger, C.; Holler, A.; Haas, S.; Matischek, R. Automated Authentication Credential Derivation for the Secured Configuration of IoT Devices. In Proceedings of the 2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES), Graz, Austria, 6–8 June 2018; pp. 1–8. [Google Scholar] [CrossRef]
- Gebrie, M.T.; Abie, H. Risk-Based Adaptive Authentication for Internet of Things in Smart Home EHealth. In Proceedings of the 11th European Conference on Software Architecture: Companion Proceedings (ECSA ’17); Association for Computing Machinery: New York, NY, USA, 2017; pp. 102–108. [Google Scholar] [CrossRef]
- Wang, M.; Yan, Z. Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications. IEEE Trans. Ind. Inform. 2018, 14, 3637–3647. [Google Scholar] [CrossRef] [Green Version]
- Nespoli, P.; Zago, M.; Huertas Celdrán, A.; Gil Pérez, M.; Gómez Mármol, F.; García Clemente, F.J. PALOT: Profiling and Authenticating Users Leveraging Internet of Things. Sensors 2019, 19, 2832. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Ghosh, N.; Chandra, S.; Sachidananda, V.; Elovici, Y. SoftAuthZ: A Context-Aware, Behaviour-Based Authorization Framework for Home IoT. IEEE Int. Things J. 2019, 6, 10773–10785. [Google Scholar] [CrossRef]
- Gad, R.; Abd El-Latif, A.A.; Elseuofi, S.; Ibrahim, H.M.; Elmezain, M.; Said, W. IoT Security Based on Iris Verification Using Multi-Algorithm Feature Level Fusion Scheme. In Proceedings of the 2019 2nd International Conference on Computer Applications Information Security (ICCAIS), Riyadh, Saudi Arabia, 1–3 May 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Mbarek, B.; Buhnova, B.; Pitner, T. SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems. In Proceedings of the 2019 15th International Wireless Communications Mobile Computing Conference (IWCMC), Tangier, Morocco, 24–28 June 2019; pp. 1373–1378. [Google Scholar] [CrossRef]
- Hasan, A.; Qureshi, K. Internet of Things Device Authentication Scheme Using Hardware Serialization. In Proceedings of the 2018 International Conference on Applied and Engineering Mathematics (ICAEM), Taxila, Pakistan, 4–5 September 2018; pp. 109–114. [Google Scholar] [CrossRef]
- Arfaoui, A.; Cherkaoui, S.; Kribeche, A.; Senouci, S.M.; Hamdi, M. Context-Aware Adaptive Authentication and Authorization in Internet of Things. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Murphy, J.; Howells, G.; McDonald-Maier, K.D. Multi-factor authentication using accelerometers for the Internet-of-Things. In Proceedings of the 2017 Seventh International Conference on Emerging Security Technologies (EST), Canterbury, UK, 6–8 September 2017; pp. 103–107. [Google Scholar] [CrossRef] [Green Version]
- Durand, A.; Gremaud, P.; Pasquier, J. Decentralized Web of Trust and Authentication for the Internet of Things. In Proceedings of the Seventh International Conference on the Internet of Things (IoT ’17); Association for Computing Machinery: New York, NY, USA, 2017. [Google Scholar] [CrossRef]
- Pallavi, K.N.; Ravi Kumar, V. Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment. Wirel. Pers. Commun. 2020, 116, 3039–3060. [Google Scholar] [CrossRef]
- Saadeh, M.; Sleit, A.; Sabri, K.E.; Almobaideen, W. Hierarchical architecture and protocol for mobile object authentication in the context of IoT smart cities. J. Netw. Comput. Appl. 2018, 121, 1–19. [Google Scholar] [CrossRef]
- Carnley, P.R.; Rowland, P.; Bishop, D.; Bagui, S.; Miller, M. Trusted Digital Identities for Mobile Devices. In Proceedings of the 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Calgary, AB, Canada, 17–22 August 2020; pp. 483–490. [Google Scholar] [CrossRef]
- Chifor, B.C.; Bica, I.; Patriciu, V.V.; Pop, F. A security authorization scheme for smart home Internet of Things devices. Future Gener. Comput. Syst. 2018, 86, 740–749. [Google Scholar] [CrossRef]
- Batool, S.; Hassan, A.; Saqib, N.A.; Khattak, M.A.K. Authentication of Remote IoT Users Based on Deeper Gait Analysis of Sensor Data. IEEE Access 2020, 8, 101784–101796. [Google Scholar] [CrossRef]
- Gamundani, A.M.; Phillips, A.; MUYINGI, H.N. Privacy Preservation and Security Dilemma: Relationship proposition for IoT authentication. In Proceedings of the 2018 International Conference on Recent Innovations in Electrical, Electronics Communication Engineering (ICRIEECE), Bhubaneswar, India, 27–28 July 2018; pp. 363–367. [Google Scholar] [CrossRef]
- Chauhan, J.; Rajasegaran, J.; Seneviratne, S.; Misra, A.; Seneviratne, A.; Lee, Y. Performance Characterization of Deep Learning Models for Breathing-Based Authentication on Resource-Constrained Devices. In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies; ACM: New York, NY, USA, 2018; Volume 2, pp. 1–24. [Google Scholar] [CrossRef]
- Sharaf Dabbagh, Y.; Saad, W. Authentication of Wireless Devices in the Internet of Things: Learning and Environmental Effects. IEEE Int. Things J. 2019, 6, 6692–6705. [Google Scholar] [CrossRef]
- Ali, I.; Asif, M. Applying security patterns for authorization of users in IoT based applications. In Proceedings of the 2018 International Conference on Engineering and Emerging Technologies (ICEET), Lahore, Pakistan, 22–23 February 2018; pp. 1–5. [Google Scholar] [CrossRef]
- Wallis, K.; Merzinger, M.; Reich, C.; Schindelhauer, C. A Security Model Based Authorization Concept for OPC Unified Architecture. In Proceedings of the 10th International Conference on Advances in Information Technology (IAIT 2018); Association for Computing Machinery: New York, NY, USA, 2018. [Google Scholar] [CrossRef]
- Krašovec, A.; Pellarini, D.; Geneiatakis, D.; Baldini, G.; Pejović, V. Not Quite Yourself Today: Behaviour-Based Continuous Authentication in IoT Environments. In Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies; ACM: New York, NY, USA, 2020; Volume 4, pp. 1–29. [Google Scholar] [CrossRef]
- Yang, S.K.; Shiue, Y.M.; Su, Z.Y.; Liu, C.G. A Novel Authentication Scheme Against Node Captured Attack in WSN for Healthcare Scene. In Proceedings of the 2019 IEEE Eurasia Conference on Biomedical Engineering, Healthcare and Sustainability (ECBIOS), Okinawa, Japan, 31 May–3 June 2019; pp. 39–42. [Google Scholar] [CrossRef]
- Sahoo, S.; Sahoo, S.S.; Maiti, P.; Sahoo, B.; Turuk, A.K. A Lightweight Authentication Scheme for Cloud-Centric IoT Applications. In Proceedings of the 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 7–8 March 2019; pp. 1024–1029. [Google Scholar] [CrossRef]
- Zhu, X.; Badr, Y.; Pacheco, J.; Hariri, S. Autonomic Identity Framework for the Internet of Things. In Proceedings of the 2017 International Conference on Cloud and Autonomic Computing (ICCAC), Tucson, AZ, USA, 18–22 September 2017; pp. 69–79. [Google Scholar] [CrossRef]
- Das, A.K.; Wazid, M.; Kumar, N.; Vasilakos, A.V.; Rodrigues, J.J.P.C. Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment. IEEE Int. Things J. 2018, 5, 4900–4913. [Google Scholar] [CrossRef]
- Khan, R. Dynamically Configurable Architecture for User Identification and Authentication for Internet of Things Platform. In Proceedings of the 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), Cox’sBazar, Bangladesh, 7–9 February 2019; pp. 1–8. [Google Scholar] [CrossRef]
- Chien, H.Y. Group-Oriented Range-Bound Key Agreement for Internet of Things Scenarios. IEEE Int. Things J. 2018, 5, 1890–1903. [Google Scholar] [CrossRef]
- Aski, V.J.; Gupta, S.; Sarkar, B. An Authentication-Centric Multi-Layered Security Model for Data Security in IoT-Enabled Biomedical Applications. In Proceedings of the 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE), Osaka, Japan, 15–18 October 2019; pp. 957–960. [Google Scholar] [CrossRef]
- Alkhresheh, A.; Elgazzar, K.; Hassanein, H.S. DACIoT: Dynamic Access Control Framework for IoT Deployments. IEEE Int. Things J. 2020, 7, 11401–11419. [Google Scholar] [CrossRef]
- Ethelbert, O.; Moghaddam, F.F.; Wieder, P.; Yahyapour, R. A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications. In Proceedings of the 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), Prague, Czech Republic, 21–23 August 2017; pp. 47–53. [Google Scholar] [CrossRef] [Green Version]
- Sun, F.; Mao, C.; Fan, X.; Li, Y. Accelerometer-Based Speed-Adaptive Gait Authentication Method for Wearable IoT Devices. IEEE Int. Things J. 2019, 6, 820–830. [Google Scholar] [CrossRef]
- Shayan, M.; Naser, M.; Hossein, G. IoT-Based Anonymous Authentication Protocol Using Biometrics in Smart Homes. In Proceedings of the 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Mashhad, Iran, 28–29 August 2019; pp. 114–121. [Google Scholar] [CrossRef]
- Elganzoury, H.S.; Abdelhafez, A.A.; Hegazy, A.A. A new secure one-time password algorithm for mobile applications. In Proceedings of the 2018 35th National Radio Science Conference (NRSC), Cairo, Egypt, 20–22 March 2018; pp. 249–257. [Google Scholar] [CrossRef]
- Oh, S.R.; Kim, Y.G. Development of IoT security component for interoperability. In Proceedings of the 2017 13th International Computer Engineering Conference (ICENCO), Cairo, Egypt, 27–28 December 2017; pp. 41–44. [Google Scholar] [CrossRef]
- Zhou, L.; Su, C.; Chiu, W.; Yeh, K.H. You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks. IEEE Trans. Emerg. Top. Comput. 2020, 8, 303–312. [Google Scholar] [CrossRef]
- Oh, S.R.; Kim, Y.G. AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth. Int. J. Distrib. Sens. Netw. 2020, 16, 1550147720906388. [Google Scholar] [CrossRef]
- Belk, M.; Fidas, C.; Pitsillides, A. FlexPass: Symbiosis of Seamless User Authentication Schemes in IoT. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA ’19); Association for Computing Machinery: New York, NY, USA, 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Hassan, M.; Mansoor, K.; Tahir, S.; Iqbal, W. Enhanced Lightweight Cloud-assisted Mutual Authentication Scheme for Wearable Devices. In Proceedings of the 2019 International Conference on Applied and Engineering Mathematics (ICAEM), Taxila, Pakistan, 27–29 August 2019; pp. 62–67. [Google Scholar] [CrossRef]
- Kaliya, N.; Hussain, M. Framework for privacy preservation in iot through classification and access control mechanisms. In Proceedings of the 2017 2nd International Conference for Convergence in Technology (I2CT), Mumbai, India, 7–9 April 2017; pp. 430–434. [Google Scholar] [CrossRef]
- Wazid, M.; Das, A.K.; Khan, M.K.; Al-Ghaiheb, A.A.D.; Kumar, N.; Vasilakos, A.V. Secure Authentication Scheme for Medicine Anti-Counterfeiting System in IoT Environment. IEEE Int. Things J. 2017, 4, 1634–1646. [Google Scholar] [CrossRef]
- Shah, R.H.; Salapurkar, D.P. A multifactor authentication system using secret splitting in the perspective of Cloud of Things. In Proceedings of the 2017 International Conference on Emerging Trends Innovation in ICT (ICEI), Pune, India, 3–5 February 2017; pp. 1–4. [Google Scholar] [CrossRef]
- Amoon, M.; Altameem, T.; Altameem, A. RRAC: Role based reputed access control method for mitigating malicious impact in intelligent IoT platforms. Comput. Commun. 2020, 151, 238–246. [Google Scholar] [CrossRef]
- Yazdanpanah, H.; Azizi, M.; Pournaghi, S.M. A Secure and Improved Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Internet of Things Environment. In Proceedings of the 2020 17th International ISC Conference on Information Security and Cryptology (ISCISC), Tehran, Iran, 9–10 September 2020; pp. 36–43. [Google Scholar] [CrossRef]
- Barbareschi, M.; De Benedictis, A.; La Montagna, E.; Mazzeo, A.; Mazzocca, N. PUF-Enabled Authentication-as-a-Service in Fog-IoT Systems. In Proceedings of the 2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Napoli, Italy, 12–14 June 2019; pp. 58–63. [Google Scholar] [CrossRef]
- Loske, M.; Rothe, L.; Gertler, D.G. Context-Aware Authentication: State-of-the-Art Evaluation and Adaption to the IIoT. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019; pp. 64–69. [Google Scholar] [CrossRef]
- Shahzad, M.; Singh, M.P. Continuous Authentication and Authorization for the Internet of Things. IEEE Int. Comput. 2017, 21, 86–90. [Google Scholar] [CrossRef]
- Rattanalerdnusorn, E.; Thaenkaew, P.; Vorakulpipat, C. Security Implementation For Authentication In Iot Environments. In Proceedings of the 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS), Singapore, 23–25 February 2019; pp. 678–681. [Google Scholar] [CrossRef]
- Prathibha, L.; Fatima, K. Exploring Security and Authentication Issues in Internet of Things. In Proceedings of the 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 14–15 June 2018; pp. 673–678. [Google Scholar] [CrossRef]
- Whaiduzzaman, M.; Oliullah, K.; Mahi, M.J.N.; Barros, A. AUASF: An Anonymous Users Authentication Scheme for Fog-IoT Environment. In Proceedings of the 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India, 1–3 July 2020; pp. 1–7. [Google Scholar] [CrossRef]
- Liu, H.; Li, J.; Gu, D. Understanding the security of app-in-the-middle IoT. Comput. Secur. 2020, 97, 102000. [Google Scholar] [CrossRef]
- El Kalam, A.A.; Outchakoucht, A.; Es-Samaali, H. Emergence-Based Access Control: New Approach to Secure the Internet of Things. In Proceedings of the 1st International Conference on Digital Tools & Uses Congress (DTUC ’18); Association for Computing Machinery: New York, NY, USA, 2018. [Google Scholar] [CrossRef]
- Genç, D.; Tomur, E.; Erten, Y.M. Context-Aware Operation-Based Access Control for Internet of Things Applications. In Proceedings of the 2019 International Symposium on Networks, Computers and Communications (ISNCC), Istanbul, Turkey, 18–20 June 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Ashibani, Y.; Kauling, D.; Mahmoud, Q.H. A context-aware authentication service for smart homes. In Proceedings of the 2017 14th IEEE Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2017; pp. 588–589. [Google Scholar] [CrossRef]
- Bhatt, S.; Sandhu, R. ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things. In Proceedings of the 25th ACM Symposium on Access Control Models and Technologies (SACMAT ’20); Association for Computing Machinery: New York, NY, USA, 2020; pp. 203–212. [Google Scholar] [CrossRef]
- Pal, S.; Hitchens, M.; Varadharajan, V.; Rabehaja, T. On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous 2017); Association for Computing Machinery: New York, NY, USA, 2017; pp. 432–441. [Google Scholar] [CrossRef]
- Miettinen, M.; Nguyen, T.D.; Sadeghi, A.R.; Asokan, N. Revisiting Context-Based Authentication in IoT. In Proceedings of the 55th Annual Design Automation Conference (DAC ’18); Association for Computing Machinery: New York, NY, USA, 2018. [Google Scholar] [CrossRef] [Green Version]
- Lu, C.X.; Li, Y.; Xiangli, Y.; Li, Z. Nowhere to Hide: Cross-Modal Identity Leakage between Biometrics and Devices. In Proceedings of The Web Conference 2020 (WWW ’20); Association for Computing Machinery: New York, NY, USA, 2020; pp. 212–223. [Google Scholar] [CrossRef]
- Gupta, M.; Benson, J.; Patwa, F.; Sandhu, R. Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars. In Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy (CODASPY ’19); Association for Computing Machinery: New York, NY, USA, 2019; pp. 61–72. [Google Scholar] [CrossRef]
- Salama, U.; Yao, L.; Wang, X.; Paik, H.Y.; Beheshti, A. Multi-Level Privacy-Preserving Access Control as a Service for Personal Healthcare Monitoring. In Proceedings of the 2017 IEEE International Conference on Web Services (ICWS), Honolulu, HI, USA, 25–30 June 2017; pp. 878–881. [Google Scholar] [CrossRef]
- Blue, L.; Abdullah, H.; Vargas, L.; Traynor, P. 2MA: Verifying Voice Commands via Two Microphone Authentication (ASIACCS ’18); Association for Computing Machinery: New York, NY, USA, 2018; pp. 89–100. [Google Scholar] [CrossRef]
- Islam, S.M.R.; Hossain, M.; Hasan, R.; Duong, T.Q. A conceptual framework for an IoT-based health assistant and its authorization model. In Proceedings of the 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 8–10 January 2018; pp. 616–621. [Google Scholar] [CrossRef]
- Srinivas, J.; Das, A.K.; Wazid, M.; Kumar, N. Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things. IEEE Trans. Depend. Secur. Comput. 2020, 17, 1133–1146. [Google Scholar] [CrossRef]
- Pal, S.; Hitchens, M.; Varadharajan, V. Towards the Design of a Trust Management Framework for the Internet of Things. In Proceedings of the 2019 13th International Conference on Sensing Technology (ICST), Sydney, NSW, Australia, 2–4 December 2019; pp. 1–7. [Google Scholar] [CrossRef]
- Atlam, H.F.; Wills, G.B. An efficient security risk estimation technique for Risk-based access control model for IoT. Int. Things 2019, 6, 100052. [Google Scholar] [CrossRef] [Green Version]
- Khalil, A.; Mbarek, N.; Togni, O. IoT-MAAC: Multiple Attribute Access Control for IoT environments. In Proceedings of the 2020 IEEE 17th Annual Consumer Communications Networking Conference (CCNC), Las Vegas, NV, USA, 10–13 January 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Djilali, H.B.; Tandjaoui, D.; Khemissa, H. Enhanced dynamic team access control for collaborative Internet of Things using context. Trans. Emerg. Telecommun. Technol. 2020, 32, e4083. [Google Scholar] [CrossRef]
- Van hamme, T.; Preuveneers, D.; Joosen, W. A Dynamic Decision Fusion Middleware for Trustworthy Context-Aware IoT Applications. In Proceedings of the 4th Workshop on Middleware and Applications for the Internet of Things (M4IoT ’17); Association for Computing Machinery: New York, NY, USA, 2017; pp. 1–6. [Google Scholar] [CrossRef]
- Schuster, R.; Shmatikov, V.; Tromer, E. Situational Access Control in the Internet of Things. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS ’18); Association for Computing Machinery: New York, NY, USA, 2018; pp. 1056–1073. [Google Scholar] [CrossRef]
- Aliane, L.; Adda, M. HoBAC: Toward a Higher-order Attribute-Based Access Control Model. Procedia Comput. Sci. 2019, 155, 303–310. [Google Scholar] [CrossRef]
- Nakouri, I.; Hamdi, M.; Kim, T.H. A Key Management Scheme for IoT-Based Video Surveillance Systems Based on Fingerprints. In Proceedings of the 2018 IEEE 27th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Paris, France, 27–29 June 2018; pp. 100–105. [Google Scholar] [CrossRef]
- Ranaweera, P.; Imrith, V.N.; Liyanag, M.; Jurcut, A.D. Security as a Service Platform Leveraging Multi-Access Edge Computing Infrastructure Provisions. In Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Selvarani, P.; Suresh, A.; Malarvizhi, N. Secure and optimal authentication framework for cloud management using HGAPSO algorithm. Clust. Comput. 2019, 22, 4007–4016. [Google Scholar] [CrossRef]
- Aski, V.; Dhaka, V.S.; Kumar, S.; Parashar, A.; Ladagi, A. A Multi-Factor Access Control and Ownership Transfer Framework for Future Generation Healthcare Systems. In Proceedings of the 2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC), Waknaghat, India, 6–8 November 2020; pp. 93–98. [Google Scholar] [CrossRef]
- Ahmed, S.; Mahmood, Q. An authentication based scheme for applications using JSON web token. In Proceedings of the 2019 22nd International Multitopic Conference (INMIC), Islamabad, Pakistan, 29–30 November 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Lupascu, C.; Lupascu, A.; Bica, I. DLT Based Authentication Framework for Industrial IoT Devices. Sensors 2020, 20, 2621. [Google Scholar] [CrossRef] [PubMed]
- Krishnan, K.N.; Jenu, R.; Joseph, T.; Silpa, M.L. Blockchain Based Security Framework for IoT Implementations. In Proceedings of the 2018 International CET Conference on Control, Communication, and Computing (IC4), Thiruvananthapuram, India, 5–7 July 2018; pp. 425–429. [Google Scholar] [CrossRef]
- Jonnada, S.; Dantu, R.; Shrestha, P.; Ranasinghe, I.; Widick, L. An OAuth-Based Authorization Framework for Access Control in Remote Collaboration Systems. In Proceedings of the 2018 National Cyber Summit (NCS), Huntsville, AL, USA, 5–7 June 2018; pp. 38–44. [Google Scholar] [CrossRef]
- Gebresilassie, S.K.; Rafferty, J.; Morrow, P.; Chen, L.; Abu-Tair, M.; Cui, Z. Distributed, Secure, Self-Sovereign Identity for IoT Devices. In Proceedings of the 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA, 2–16 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Martínez, J.A.; Hernández-Ramos, J.L.; Beltrán, V.; Skarmeta, A.; Ruiz, P.M. A user-centric Internet of Things platform to empower users for managing security and privacy concerns in the Internet of Energy. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717727974. [Google Scholar] [CrossRef] [Green Version]
- Colombo, P.; Ferrari, E. Access Control Enforcement within MQTT-Based Internet of Things Ecosystems. In Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies (SACMAT ’18); Association for Computing Machinery: New York, NY, USA, 2018; pp. 223–234. [Google Scholar] [CrossRef]
- Rech, A.; Pistauer, M.; Steger, C. A Novel Embedded Platform for Secure and Privacy-Concerned Cross-Domain Service Access. In Proceedings of the 2019 IEEE Intelligent Vehicles Symposium (IV), Paris, France, 9–12 June 2019; pp. 1961–1967. [Google Scholar] [CrossRef]
- Lee, S.; Choi, J.; Kim, J.; Cho, B.; Lee, S.; Kim, H.; Kim, J. FACT: Functionality-Centric Access Control System for IoT Programming Frameworks. In Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies (SACMAT ’17 Abstracts); Association for Computing Machinery: New York, NY, USA, 2017; pp. 43–54. [Google Scholar] [CrossRef]
- Hazra, S. Smart ATM Service. In Proceedings of the 2019 Devices for Integrated Circuit (DevIC), Kalyani, India, 23–24 March 2019; pp. 226–230. [Google Scholar] [CrossRef]
- Tandon, L.; Fong, P.W.L.; Safavi-Naini, R. HCAP: A History-Based Capability System for IoT Devices. In Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies (SACMAT ’18); Association for Computing Machinery: New York, NY, USA, 2018; pp. 247–258. [Google Scholar] [CrossRef]
- Wen Shieng, P.S.; Jansen, J.; Pemberton, S. Fine-grained Access Control Framework for Igor, a Unified Access Solution to The Internet of Things. Procedia Comput. Sci. 2018, 134, 385–392. [Google Scholar] [CrossRef]
- Xiong, S.; Ni, Q.; Wang, L.; Wang, Q. SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage. IEEE Int. Things J. 2020, 7, 2914–2927. [Google Scholar] [CrossRef]
- Wu, F.; Li, X.; Xu, L.; Sangaiah, A.K.; Rodrigues, J.J. Authentication Protocol for Distributed Cloud Computing: An Explanation of the Security Situations for Internet-of-Things-Enabled Devices. IEEE Consum. Electron. Mag. 2018, 7, 38–44. [Google Scholar] [CrossRef]
- Han, Z.; Liu, L.; Liu, Z. An Efficient Access Control Scheme for Smart Lock Based on Asynchronous Communication. In Proceedings of the ACM Turing Celebration Conference—China (ACM TURC ’19); Association for Computing Machinery: New York, NY, USA, 2019. [Google Scholar] [CrossRef]
- Fremantle, P.; Aziz, B. Cloud-based federated identity for the Internet of Things. Ann. Telecommun. 2018, 73, 415–427. [Google Scholar] [CrossRef] [Green Version]
- Ben Daoud, W.; Meddeb-Makhlouf, A.; Zarai, F. A Trust-based Access Control Scheme for e-Health Cloud. In Proceedings of the 2018 IEEE/ACS 15th International Conference on Computer Systems and Applications (AICCSA), Aqaba, Jordan, 28 October–1 November 2018; pp. 1–7. [Google Scholar] [CrossRef]
- Cui, J.; Wang, F.; Zhang, Q.; Xu, Y.; Zhong, H. An Anonymous Message Authentication Scheme for Semi-trusted Edge-enabled IIoT. IEEE Trans. Ind. Electron. 2020, 68, 12921–12929. [Google Scholar] [CrossRef]
- Vorakulpipat, C.; Takahashi, T.; Rattanalerdnusorn, E.; Thaenkaew, P.; Inoue, D. Usable and Secure Cloud-based Biometric Authentication Solution for IoT Devices. In Proceedings of the 2018 IEEE Symposium on Computers and Communications (ISCC), Natal, Brazil, 25–28 June 2018; pp. 274–277. [Google Scholar] [CrossRef]
- Li, G. Security Architecture of Computer Communication System Based on Internet of Things. In Proceedings of the 2020 International Conference on Aviation Safety and Information Technology (ICASIT 2020); Association for Computing Machinery: New York, NY, USA, 2020; pp. 693–697. [Google Scholar] [CrossRef]
- Gur, S.; Demir, S.; Simsek, S.; Levi, A. Secure and Privacy-Aware Gateway for Home Automation Systems. In Proceedings of the 13th International Conference on Security of Information and Networks (SIN 2020); Association for Computing Machinery: New York, NY, USA, 2020. [Google Scholar] [CrossRef]
- Gong, B.; Wang, Y.; Liu, X.; Qi, F.; Sun, Z. A trusted attestation mechanism for the sensing nodes of Internet of Things based on dynamic trusted measurement. China Commun. 2018, 15, 100–121. [Google Scholar] [CrossRef]
- Gwak, B.; Cho, J.H.; Lee, D.; Son, H. TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-Things. In Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; pp. 74–85. [Google Scholar] [CrossRef]
- Chen, H.C. Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application. Mob. Netw. Appl. 2019, 24, 839–852. [Google Scholar] [CrossRef]
- Foundation, P.S. Pdftotext. 2021. Available online: https://pypi.org/project/pdftotext/ (accessed on 12 July 2021).
- Foundation, P.S. Rake-Nltk. 2021. Available online: https://pypi.org/project/rake-nltk/ (accessed on 12 July 2021).
- Jin, X.; Krishnan, R.; Sandhu, R. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. In Data and Applications Security and Privacy XXVI; Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 41–55. [Google Scholar]
- Ferraiolo, D.; Kuhn, R. Role-Based Access Control. In Proceedings of the 15th National Computer Security Conference, Baltimore, MD, USA, 13–16 October 1992; pp. 554–556. [Google Scholar]
- Rosslin, J.; Robles, R.; Kim, T.H. Review: Context Aware Tools for Smart Home Development. Int. J. Smart Home 2010, 4, 1–12. [Google Scholar]
- Jones, M.; Bradley, J.; Sakimura, N. JSON Web Token (JWT). RFC 7519, RFC Editor. 2015. Available online: http://www.rfc-editor.org/rfc/rfc7519.txt (accessed on 12 July 2021).
- Wohlin, C.; Runeson, P.; Höst, M.; Ohlsson, M.C.; Regnell, B.; Wesslén, A. Experimentation in Software Engineering; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
Publication | Published | Summary |
---|---|---|
Noor et al. [5] | 2019 | A comprehensive overview of authentication and authorization research for years between 2016 and 2018. |
Trnka et al. [6] | 2018 | Mapping study for authentication and authorization articles from 2012 to 2017. |
Chanal et al. [8] | 2020 | Survey providing an overview of architectures, privacy and research challenges, and differences of solutions between domains. |
Milovlaskaya et al. [7] | 2019 | Great overview of IoT back-end security issues, general hardware, and application security, along with a summary of IoT security management and security standards. |
Al-Naji et al. [9] | 2020 | Focused survey on continuous authentication methods. |
Tange et al. [10] | 2020 | Focused survey on industrial IoT security issues. |
Indexer | Query |
---|---|
General query | (“Internet of Things” OR “IoT”) AND “Security” AND (“Authentication” OR “Authorization” OR “Identity” OR “Access control”) AND NOT (“Network” OR “Hardware” OR “RFID” OR “Protocol” OR “Cryptography” OR “Survey” OR “Study”) |
IEEE Xplore | ((“Abstract”: “Internet of Things” OR “Abstract”: “IoT”) AND (“Abstract”: “Authentication” OR “Abstract”: “Authorization” OR documentAbstract: “Identity” OR “Abstract”: “Access Control”) AND “Index Terms”: “Security” AND NOT(“Index Terms”: “Network” OR documentAbstract: “Hardware” OR “Abstract”: “Cryptography” OR “Abstract”: “Protocol” OR “Document Title”: “Survey” OR “Abstract”: “RFID” OR “Document Title”: "Study")) |
ACM DL | Abstract: (IoT “Internet of Things”) AND Abstract: (“Authentication” OR “Authorization” OR “Identity” OR “Access Control”) AND Title: (-study -Survey) AND Abstract: (-Hardware -rfid -Cryptography) AND Keyword: (-Hardware -Physical -Network) |
WoS SCIE | TI = (Internet of Things OR IoT) AND TS = (Authentication OR Authorization OR Identity OR Access Control) NOT TS = (Hardware OR Cryptography OR Protocol OR RFID OR Physical OR Network) NOT TS = (Survey OR Study) AND TS = Security |
SpringerLink | ‘(Authentication OR Authorization OR Identity OR “Access Control”) + title (“Internet of Things” OR IoT)’ |
ScienceDirect | (“Internet of Things” OR “IoT”) AND (“Authentication” OR “Authorization” OR “Identity” OR “Access control”) AND NOT (“Hardware” OR “Cryptography”) |
Indexer | Results | Prefiltered | Relevant |
---|---|---|---|
IEEE Xplore | 442 | 90 | 76 |
ACM DL | 150 | 43 | 28 |
WoS | 133 | 56 | 16 |
SpringerLink | 491 | 6 | 2 |
ScienceDirect | 406 | 19 | 10 |
Total | 1622 | 214 | 132 |
References | Context Aware? | Topology (Centr./Distr.) | Communication Model | Existing vs. New | Domains | Constrained/ Unconstrained Devices | Required Special or External Devices |
---|---|---|---|---|---|---|---|
Ibrahim et al. [11] | N | C | U2M | Extension | Smart Home | C | Biometric |
Baruah et al. [12] | N | D | Both | Extension | Industrial IoT Devices | C | Sensor, Router |
Zulkipli et al. [13] | N | D | M2M | New | General | N/A | - |
Chen et al. [14] | N | N/A | U2M | Extension | General | C | Biometrics ECG |
Kashmar et al. [15] | Y | N/A | N/A | Existing | General | N/A | - |
Karimibiuki et al. [16] | Y | D | Both | Existing | General | U | - |
Chen et al. [17] | N | Both | Both | Extension | General | U | - |
Olazabal et al. [18] | Y | C | U2M | Extension | Biometrics | U | - |
Terkawi et al. [19] | N | N/A | N/A | Extension | General | N/A | - |
Hoang et al. [20] | Y | C | U2M | Existing | General | N/A | - |
Cattermole et al. [21] | Y | D | M2M | Existing | General | N/A | - |
Mathew et al. [22] | Y | C | U2M | Existing | Home security | C | Biometrics |
Jain et al. [23] | Y | C | Both | Existing | Automated Attendance System | U | Camera |
Guo et al. [24] | Y | D | U2M | Extension | Fog Computing authentication | C | - |
Renuka et al. [25] | N | N/A | M2M | Extension | IoT Environment | N/A | - |
Kim et al. [26] | Y | C | U2M | Existing | General | U | - |
Felde et al. [27] | N | D | M2M | Extension | Dynamic groups | U | - |
Mahbub et al. [28] | N | Both | M2M | Existing | General | C | RFID |
Heydari et al. [29] | N | N/A | U2M | Extension | Fog Computing | N/A | - |
Ning et al. [30] | N | D | Both | Existing | General | U | - |
Leung et al. [31] | N | D | U2M | New | General | C | Smart Watch |
Bilgen et al. [32] | Y | C | U2M | Existing | General | U | - |
Oh et al. [33] | N | C | Both | New | IoT Platforms | U | - |
Dammak et al. [34] | N | N/A | Both | Extension | General | C | - |
Nespoli et al. [35] | Y | D | U2M | Existing | IoT Environments | U | - |
Rothe et al. [36] | Y | N/A | N/A | New | General | N/A | - |
Ouaddaha et al. [37] | N | D | N/A | New | General | N/A | - |
Yan et al. [38] | N | C | Both | Extension | Home security | C | Smart device (Door Lock), Smartphone |
Chiu et al. [39] | N | C | U2M | Existing | Wearable Devices | C | Wearable brainwave headsets |
Phoka et al. [40] | N | D | U2M | Existing | Security door | C | IR Sensor |
Heydaria et al. [41] | N | N/A | N/A | New | General | N/A | - |
Malarvizhi et al. [42] | N | C | U2M | Extension | Multi-bio authentication | C | Biometric scanners |
Sharif et al. [43] | N | C | M2M | Existing | Road Construction | N/A | - |
Ashibani et al. [44] | Y | D | U2M | Extension | Smart Home | C | Sensor |
Ulz et al. [45] | N | N/A | Both | Existing | General | U | - |
Gebrie et al. [46] | Y | C | U2M | New | Healthcare and Smart Home | C | Biometrics |
Wang et al. [47] | N | D | Both | Extension | General | U | - |
Nespoli et al. [48] | Y | C | U2M | Extension | IoT Platforms | C | Security devices, Sensor |
Ghosh et al. [49] | Y | C | Both | Existing | Home IoT platform or Web service | C | Security devices |
Gad et al. [50] | N | N/A | U2M | Existing | General | C | - |
Mbarek et al. [51] | N | C | U2M | Existing | Smart Home | C | - |
Hasan et al. [52] | Y | D | Both | Extension | General | C | Maxim DS2411 |
Arfaoui et al. [53] | Y | C | Both | Extension | General | U | - |
Murphy et al. [54] | N | D | M2M | Extension | General | C | Accelerometers |
Durand et al. [55] | N | D | M2M | Existing | General | N/A | - |
Pallavi et al. [56] | N | D | Both | Extension | Fog computing | C | Sensor |
Saadeh et al. [57] | N | N/A | N/A | Existing | General | N/A | - |
Carnley et al. [58] | N | D | N/A | Extension | Smartphone Devices | U | - |
Chifora et al. [59] | Y | C | U2M | Extension | Smart Home | U | - |
Batool et al. [60] | Y | C | U2M | Existing | Healthcare | C | Electrocardiogram (ECG) |
Gamundani et al. [61] | N | N/A | N/A | New | Smart Home | N/A | - |
Chauhan et al. [62] | N | D | U2M | Existing | General | C | Smartphone, Smartwatch, Raspberry Pi |
Dabbagh et al. [63] | Y | D | Both | Existing | All Wireless devices | U | Biometrics |
Ali et al. [64] | N | D | U2M | Extension | Healthcare | U | - |
Wallis et al. [65] | Y | C | M2M | New | General | U | - |
Krašovec et al. [66] | Y | Both | M2M | Existing | General | C | Sensors |
Yang et al. [67] | N | C | Both | Existing | Healthcare | C | Sensor |
Sahoo et al. [68] | N | C | U2M | Extension | General | U | - |
Zhu et al. [69] | N | D | N/A | Existing | Smart Home | C | - |
Das et al. [70] | N | C | U2M | Extension | Industrial Internet of Things | C | Biometric sensor |
R. Khan [71] | N | C | Both | Existing | General | U | - |
Chien [72] | Y | D | Both | Existing | General | U | - |
Aski et al. [73] | Y | D | U2M | Existing | Healthcare | U | Raspberry pi |
Alkhresheh et al. [74] | Y | N/A | Both | Extension | IoT Platforms | C | Raspberry Pi |
Ethelbert et al. [75] | Y | C | U2M | Extension | Cloud SaaS Applications | U | - |
Sun et al. [76] | Y | C | U2M | Existing | Wearable Devices | C | Accelerometer |
References | Context Aware? | Topology (Centr./Distr.) | Communication Model | Existing vs. New | Domains | Constrained/ Unconstrained Devices | Required Special or External Devices |
---|---|---|---|---|---|---|---|
Shayan et al. [77] | Y | C | U2M | Extension | Smart Home | C | Smart phone, Biometrics |
Elganzoury et al. [78] | N | N/A | U2M | Existing | Mobile banking | U | - |
Oh et al. [79] | N | D | M2M | Extension | General | C | - |
Zhou et al. [80] | N | N/A | U2M | Extension | General | U | Brainwave Sensor |
Oh et al. [81] | N | D | Both | Extension | IoT platforms | C | Sensor |
Belk et al. [82] | N | C | U2M | Existing | General | U | - |
Hassan et al. [83] | N | D | U2M | Extension | Wearable Devices | C | Smart phone |
Kaliya et al. [84] | N | N/A | N/A | Existing | General | U | - |
Wazid et al. [85] | N | D | U2M | Extension | Medicine validity detection | C | - |
Shah et al. [86] | Y | N/A | N/A | New | General | N/A | - |
Amoon et al. [87] | Y | D | M2M | Extension | Any access-control | U | - |
Yazdanpanah et al. [88] | N | C | M2M | Extension | Wireless Sensor Networks | C | Sensor |
Barbareschi et al. [89] | N | D | M2M | Extension | Computing Fog | C | - |
Loske et al. [90] | Y | N/A | N/A | New | General | N/A | - |
Shahzad et al. [91] | Y | C | Both | Extension | General | U | - |
Rattanalerdnusorn et al. [92] | Y | D | U2M | Existing | IoT Environments | U | - |
Prathibha et al. [93] | N | C | U2M | New | Smart Home | U | Biometrics |
Whaiduzzaman et al. [94] | N | C | U2M | Existing | Fog IoT Environment | U | - |
Liu et al. [95] | Y | C | M2M | Existing | Smartphone-centric | C | Smartphone |
El Kalam et al. [96] | N | D | M2M | Existing | General | N/A | - |
Genç et al. [97] | Y | D | Both | Extension | Smart device | U | - |
Ashibani et al. [98] | Y | D | U2M | Existing | Smart Home | U | - |
Bhatt et al. [99] | N | Both | M2M | Existing | General | N/A | - |
Pal et al. [100] | Y | D | U2M | Existing | Healthcare (only Smartphone Device) | C | - |
Miettinen et al. [101] | Y | C | M2M | Existing | General | N/A | - |
Lu et al. [102] | Y | C | U2M | Existing | General | C | Biometrics |
Gupta et al. [103] | Y | C | M2M | Existing | Cars, Vehicles | C | Cars Location Tools |
Salama et al. [104] | Y | D | U2M | Existing | Healthcare | C | - |
Blue et al. [105] | Y | D | U2M | Existing | General | C | Microphones |
Islam et al. [106] | N | D | U2M | Extension | Healthcare | U | - |
Srinivas et al. [107] | Y | N/A | U2M | Existing | Industrial Internet of Things | C | Smartcard, Biometrics |
Pal et al. [108] | Y | D | Both | Extension | General | U | - |
Atlamab et al. [109] | N | C | M2M | New | General | U | - |
Khalil et al. [110] | N | D | M2M | Extension | IoT Environments | U | - |
Djilali et al. [111] | Y | C | Both | Extension | IoT Platforms | U | - |
Van hamme et al. [112] | Y | C | U2M | Existing | General | N/A | - |
Schuster et al. [113] | Y | D | M2M | Existing | General | N/A | - |
Alianea et al. [114] | Y | D | M2M | Extension | Any access-control | U | - |
Nakouri et al. [115] | N | D | M2M | Extension | Video Surveillance Systems | U | Camera, Fingerprint sensor |
Ranaweera et al. [116] | N | D | Both | Existing | Multi-access Edge Computing platform | N/A | - |
Selvarani et al. [117] | N | N/A | N/A | Extension | General | N/A | - |
Aski et al. [118] | N | D | U2M | Existing | Healthcare | U | Biometrics |
Ahmed et al. [119] | N | N/A | U2M | Extension | General | U | - |
Lupascu et al. [120] | Y | D | M2M | Existing | Industrial IoT Devices | C | IoT device/Sensor |
Krishnan et al. [121] | Y | D | Both | Existing | Controlled IoT device | C | Blockchain, Sensor |
Jonnada et al. [122] | N | C | U2M | Extension | Remote Collaboration Systems | U | - |
Gebresilassie et al. [123] | N | D | N/A | Existing | General | N/A | - |
Martinez et al. [124] | Y | D | Both | Extension | Smart city | C | Smartphone, Smart meter |
Colombo et al. [125] | Y | C | M2M | Existing | General | N/A | - |
Rech et al. [126] | N | Both | U2M | Existing | Cross-Domain Service | C | Bluetooth |
Lee et al. [127] | N | C | M2M | New | General | N/A | - |
S. Hazra [128] | N | N/A | U2M | Extension | ATM service | C | Biometrics |
Tandon et al. [129] | Y | D | M2M | Existing | General | U | - |
Shieng et al. [130] | N | C | M2M | Extension | Smart Home | C | - |
Xiong et al. [131] | N | D | Both | Extension | IoT Cloud Storage | U | - |
Wu et al. [132] | N | C | U2M | Extension | Distributed Cloud Computing | U | - |
Han et al. [133] | Y | C | U2M | Existing | General | U | - |
Fremantle et al. [134] | N | C | Both | Extension | IoT Platforms | U | - |
Daoud et al. [135] | N | D | U2M | Existing | Healthcare cloud environment | C | Sensor, ECG |
Cui et al. [136] | N | D | U2M | Extension | General | U | - |
Vorakulpipat et al. [137] | Y | C | U2M | Existing | Card reader, finger print reader | C | Cards |
Li [138] | N | Both | M2M | Existing | General | U | - |
Gur et al. [139] | Y | D | U2M | Existing | IoT Platforms | C | IHG |
Gong et al. [140] | N | N/A | M2M | Existing | Smart city | C | Sensor |
Gwak et al. [141] | N | D | U2M | Existing | General | U | - |
Chen [142] | Y | D | Both | Extension | Security | C | Sensors |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Trnka, M.; Abdelfattah, A.S.; Shrestha, A.; Coffey, M.; Cerny, T. Systematic Review of Authentication and Authorization Advancements for the Internet of Things. Sensors 2022, 22, 1361. https://doi.org/10.3390/s22041361
Trnka M, Abdelfattah AS, Shrestha A, Coffey M, Cerny T. Systematic Review of Authentication and Authorization Advancements for the Internet of Things. Sensors. 2022; 22(4):1361. https://doi.org/10.3390/s22041361
Chicago/Turabian StyleTrnka, Michal, Amr S. Abdelfattah, Aishwarya Shrestha, Michael Coffey, and Tomas Cerny. 2022. "Systematic Review of Authentication and Authorization Advancements for the Internet of Things" Sensors 22, no. 4: 1361. https://doi.org/10.3390/s22041361