Survey of Authentication and Authorization for the Internet of Things

被引:47
|
作者
Trnka, Michal [1 ]
Cerny, Tomas [2 ]
Stickney, Nathaniel [2 ]
机构
[1] Czech Tech Univ, FEE, Dept Comp Sci, Prague, Czech Republic
[2] Baylor Univ, Dept Comp Sci, Waco, TX 76798 USA
关键词
ACCESS-CONTROL MODEL; PRIVACY; ARCHITECTURE; SECURITY; MOBILE; SYSTEM; TRUST;
D O I
10.1155/2018/4351603
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is currently getting significant interest from the scientific community. Academia and industry are both focused on moving ahead in attempts to enhance usability, maintainability, and security through standardization and development of best practices. We focus on security because of its impact as one of the most limiting factors to wider Internet of Things adoption. Numerous research areas exist in the security domain, ranging from cryptography to network security to identity management. This paper provides a survey of existing research applicable to the Internet of Things environment at the application layer in the areas of identity management, authentication, and authorization. We survey and analyze more than 200 articles, categorize them, and present current trends in the Internet of Things security domain.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Key Agreement and Authentication Protocols in the Internet of Things: A Survey
    Szymoniak, Sabina
    Kesar, Shalini
    APPLIED SCIENCES-BASEL, 2023, 13 (01):
  • [22] A survey on continuous authentication methods in Internet of Things environment
    Al-Naji, Fatimah Hussain
    Zagrouba, Rachid
    COMPUTER COMMUNICATIONS, 2020, 163 : 109 - 133
  • [23] A Survey on Zero-Knowledge Authentication for Internet of Things
    Chen, Zhigang
    Jiang, Yuting
    Song, Xinxia
    Chen, Liqun
    ELECTRONICS, 2023, 12 (05)
  • [24] A Survey of Authentication in Internet of Things-Enabled Healthcare Systems
    Khan, Mudassar Ali
    Din, Ikram Ud
    Majali, Tha'er
    Kim, Byung-Seo
    SENSORS, 2022, 22 (23)
  • [25] Survey of Proximity Based Authentication Mechanisms for the Industrial Internet of Things
    Qureshi, Umair Muitaba
    Hancke, Gerhard Petrus
    Gebremichael, Teklay
    Jennehag, Ulf
    Forsstrom, Stefan
    Gidlund, Mikael
    IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 5246 - 5251
  • [26] A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
    Hasan, Mohammad Kamrul
    Zhou, Weichen
    Safie, Nurhizam
    Ahmed, Fatima Rayan Awad
    Ghazal, Taher M.
    IEEE ACCESS, 2024, 12 : 61642 - 61666
  • [27] A comprehensive survey of authentication methods in Internet-of-Things and its
    Kumar, Ashish
    Saha, Rahul
    Conti, Mauro
    Kumar, Gulshan
    Buchanan, William J.
    Kim, Tai Hoon
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 204
  • [28] Survey on Blockchain-based Internet of Things Authentication Mechanisms
    Cheng G.-J.
    Deng S.-G.
    Wen Y.-Y.
    Yan X.-Q.
    Zhao M.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (03): : 1470 - 1490
  • [29] Blockchain-Assisted Secure Intra/Inter-Domain Authorization and Authentication for Internet of Things
    Tong, Fei
    Chen, Xing
    Huang, Cheng
    Zhang, Yujian
    Shen, Xuemin
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (09) : 7761 - 7773
  • [30] MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications
    Seker, Oezlem
    Dalkilic, Goekhan
    cabuk, Umut Can
    SENSORS, 2023, 23 (12)