A survey on continuous authentication methods in Internet of Things environment

被引:53
|
作者
Al-Naji, Fatimah Hussain [1 ]
Zagrouba, Rachid [2 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Sci, POB 1982, Dammam 31441, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Informat Syst, POB 1982, Dammam 31441, Saudi Arabia
关键词
Internet of Things; Continuous authentication; Blockchain; User-related IoT; IoT-based CA; SECURITY; IOT; BLOCKCHAIN; PRIVACY; CHALLENGES; MANAGEMENT; FRAMEWORK; TRUST; COMMUNICATION; ARCHITECTURE;
D O I
10.1016/j.comcom.2020.09.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
IoT environment merges the digital and physical universes and enabling them to communicate real-time data It is crucial to constantly ensure that the user is not impersonated which brings a particular type of authentication known as continuous authentication. Therefore, this survey is primary attempt to present an overview about continuous authentication methods in IoT environment, where Blockchain-related solutions provided in this context is also discussed. Subsequently, we overview IoT environment and classify IoT attacks based on its layers with the corresponding proposed countermeasures. Next, we identify a number of open issues that must be taken into account when developing authentication schemes for IoT. We further contribute to this survey by providing a comprehensive analysis of designing continuous authentication process. Besides, we highlight the primary advantages of continuous authentication over the static authentication scheme. In this context, we review relevant works that have proposed Blockchain-based solution to strength the security of IoT systems. We further contribute to present, analyze, and compare user-related IoT-based continuous authentication solutions. Also, we present the solutions that integrate Blockchain. Finally, several research directions and open challenges are identified.
引用
收藏
页码:109 / 133
页数:25
相关论文
共 50 条
  • [1] Authentication techniques in the Internet of Things environment: A survey
    Hong, Sunghyuck
    International Journal of Network Security, 3 (462-470): : 462 - 470
  • [2] A comprehensive survey of authentication methods in Internet-of-Things and its
    Kumar, Ashish
    Saha, Rahul
    Conti, Mauro
    Kumar, Gulshan
    Buchanan, William J.
    Kim, Tai Hoon
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 204
  • [3] Leveraging User-related Internet of Things for Continuous Authentication: A Survey
    Gonzalez-Manzano, Lorena
    De Fuentes, Jose M.
    Ribagorda, Arturo
    ACM COMPUTING SURVEYS, 2019, 52 (03)
  • [4] Continuous Authentication and Authorization for the Internet of Things
    Shahzad, Muhammad
    Singh, Munindar P.
    IEEE INTERNET COMPUTING, 2017, 21 (02) : 86 - 90
  • [5] Survey of Authentication and Authorization for the Internet of Things
    Trnka, Michal
    Cerny, Tomas
    Stickney, Nathaniel
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [6] Authentication Techniques for the Internet of Things: A Survey
    Saadeh, Maha
    Sleit, Azzam
    Qatawneh, Mohammed
    Almobaideen, Wesam
    2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 28 - 34
  • [7] A Survey on Authentication Techniques for the Internet of Things
    Atwady, Yahya
    Hammoudeh, Mohammad
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [8] A Survey on Authentication Techniques for the Internet of Things
    Albalawi, Afrah
    Almrshed, Amal
    Badhib, Arwa
    Alshehri, Suhair
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 271 - 275
  • [9] Continuous Authentication in Internet-of-Things Systems
    Matiushin, I.
    Korkhov, V.
    PHYSICS OF PARTICLES AND NUCLEI, 2024, 55 (03) : 621 - 623
  • [10] A Lightweight Continuous Authentication Protocol for the Internet of Things
    Chuang, Yo-Hsuan
    Lo, Nai-Wei
    Yang, Cheng-Ying
    Tang, Ssu-Wei
    SENSORS, 2018, 18 (04)