Survey of Authentication and Authorization for the Internet of Things

被引:47
|
作者
Trnka, Michal [1 ]
Cerny, Tomas [2 ]
Stickney, Nathaniel [2 ]
机构
[1] Czech Tech Univ, FEE, Dept Comp Sci, Prague, Czech Republic
[2] Baylor Univ, Dept Comp Sci, Waco, TX 76798 USA
关键词
ACCESS-CONTROL MODEL; PRIVACY; ARCHITECTURE; SECURITY; MOBILE; SYSTEM; TRUST;
D O I
10.1155/2018/4351603
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is currently getting significant interest from the scientific community. Academia and industry are both focused on moving ahead in attempts to enhance usability, maintainability, and security through standardization and development of best practices. We focus on security because of its impact as one of the most limiting factors to wider Internet of Things adoption. Numerous research areas exist in the security domain, ranging from cryptography to network security to identity management. This paper provides a survey of existing research applicable to the Internet of Things environment at the application layer in the areas of identity management, authentication, and authorization. We survey and analyze more than 200 articles, categorize them, and present current trends in the Internet of Things security domain.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Authentication and Authorization for the Internet of Things
    Kim, Hokeun
    Lee, Edward A.
    IT PROFESSIONAL, 2017, 19 (05) : 27 - 33
  • [2] Continuous Authentication and Authorization for the Internet of Things
    Shahzad, Muhammad
    Singh, Munindar P.
    IEEE INTERNET COMPUTING, 2017, 21 (02) : 86 - 90
  • [3] Systematic Review of Authentication and Authorization Advancements for the Internet of Things
    Trnka, Michal
    Abdelfattah, Amr S.
    Shrestha, Aishwarya
    Coffey, Michael
    Cerny, Tomas
    SENSORS, 2022, 22 (04)
  • [4] Authentication, Authorization, Access Control, and Key Exchange in Internet of Things
    Simsek, Irfan
    ACM TRANSACTIONS ON INTERNET OF THINGS, 2024, 5 (02):
  • [5] A Molecular-Based Authentication and Authorization for Internet of Things Systems
    Lu, Zhirui
    Amin, Osama
    Shihada, Basem
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [6] Context-Aware Adaptive Authentication And Authorization in Internet of Things
    Arfaoui, Amel
    Cherkaoui, Soumaya
    Kribeche, Ali
    Senouci, Sidi Mohammed
    Hamdi, Mohamed
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [7] Authentication Techniques for the Internet of Things: A Survey
    Saadeh, Maha
    Sleit, Azzam
    Qatawneh, Mohammed
    Almobaideen, Wesam
    2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, : 28 - 34
  • [8] A Survey on Authentication Techniques for the Internet of Things
    Atwady, Yahya
    Hammoudeh, Mohammad
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [9] A Survey on Authentication Techniques for the Internet of Things
    Albalawi, Afrah
    Almrshed, Amal
    Badhib, Arwa
    Alshehri, Suhair
    2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 271 - 275
  • [10] A Study on Secured Authentication and Authorization in Internet of Things: Potential of Blockchain Technology
    Muzammal, Syeda Mariam
    Murugesan, Raja Kumar
    ADVANCES IN CYBER SECURITY (ACES 2019), 2020, 1132 : 18 - 32