Research of authentication techniques for the Internet of things

被引:0
|
作者
Yan H. [1 ,2 ]
Wang L. [3 ,4 ]
机构
[1] Computer Network Information Center, Chinese Academy of Sciences, Beijing
[2] University of Chinese Academy of Sciences, Beijing
[3] School of Data Science, Tongren University, Tongren
[4] State Key Laboratory of Public Big Data, College of Computer Science Technology, Guizhou University, Guiyang
来源
基金
中国国家自然科学基金;
关键词
Authentication technique; IoT; Light-weight protocol; Secure authentication;
D O I
10.11959/j.issn.1000-436x.2020131
中图分类号
学科分类号
摘要
Identity authentication technology is a key technology in the Internet of things (IoT)security field which ensures the authenticity of the identity information of users and device nodes connected to the IoT. Due to the low cost, low power consumption, small storage of IoT devices and heterogeneity of IoT network, the identity authentication mechanisms in traditional computer networks are often not applicable. Firstly, the development process of IoT was introduced, the security risks of IoT and the challenges faced by the authentication work were analyzed. Then the emphasis was put on comparison of the advantages and disadvantages among five typical authentication protocols. Moreover, the authentication technologies in several practical scenarios of RFID, smart grid, Internet of vehicles, and smart home were summarized and analyzed. Finally, the future research direction was discussed. © 2020, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:213 / 222
页数:9
相关论文
共 55 条
  • [1] GUBBI J, BUYYA R, MARUSIC S, Et al., Internet of things (IoT): a vision, architectural ele-ments, and future directions, Future Generation Computer Systems, 29, 7, pp. 1645-1660, (2013)
  • [2] EL-HAJJ M, CHAMOUN M, FADLALLAH A, Et al., Analysis of authentication techniques in Internet of things (IoT), Proceedings of the 20171st Cyber Security in Networking Confe-rence, pp. 1-3, (2017)
  • [3] EL-HAJJ M, CHAMOUN M, FADLALLAH A, Et al., Taxonomy of authentication techniques in Internet of things (IoT), IEEE 15th Student Conference on Research and Development, pp. 67-71, (2017)
  • [4] CISCO. 2019 networking re-port
  • [5] BUGHIN J, CHUI M, MANYIKA J., An executive's guide to the Internet of things, McKinsey Quart, 4, pp. 92-101, (2015)
  • [6] The Internet of things: mapping the value beyond the hype
  • [7] MARESCH D, GARTNER J., Make disruptive technological change happen-the case of additive manufacturing, Technological Forecasting and Social Change, (2018)
  • [8] HERNANDEZ G, ARIAS O, BUENTELLO D, Et al., Smart nest thermostat: a smart spy in your home-black hat, (2014)
  • [9] TRAPPE W, HOWARD R, MOORE R S., Low-energy security: limits and opportunities in the Internet of things, IEEE Security Privacy, 13, pp. 14-21, (2015)
  • [10] AHMED M E, KIM H., DDoS attack mitigation in Internet of things using software defined networking, IEEE Third International Conference on Big Data Computing Service and Applications (Big Data Service), pp. 271-276, (2017)