Survey of Authentication and Authorization for the Internet of Things

被引:47
|
作者
Trnka, Michal [1 ]
Cerny, Tomas [2 ]
Stickney, Nathaniel [2 ]
机构
[1] Czech Tech Univ, FEE, Dept Comp Sci, Prague, Czech Republic
[2] Baylor Univ, Dept Comp Sci, Waco, TX 76798 USA
关键词
ACCESS-CONTROL MODEL; PRIVACY; ARCHITECTURE; SECURITY; MOBILE; SYSTEM; TRUST;
D O I
10.1155/2018/4351603
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is currently getting significant interest from the scientific community. Academia and industry are both focused on moving ahead in attempts to enhance usability, maintainability, and security through standardization and development of best practices. We focus on security because of its impact as one of the most limiting factors to wider Internet of Things adoption. Numerous research areas exist in the security domain, ranging from cryptography to network security to identity management. This paper provides a survey of existing research applicable to the Internet of Things environment at the application layer in the areas of identity management, authentication, and authorization. We survey and analyze more than 200 articles, categorize them, and present current trends in the Internet of Things security domain.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] AAA protocols: Authentication, authorization, and accounting for the Internet
    Metz, C
    IEEE INTERNET COMPUTING, 1999, 3 (06) : 75 - 79
  • [32] Leveraging User-related Internet of Things for Continuous Authentication: A Survey
    Gonzalez-Manzano, Lorena
    De Fuentes, Jose M.
    Ribagorda, Arturo
    ACM COMPUTING SURVEYS, 2019, 52 (03)
  • [33] Secure Authentication on the Internet of Things
    Griffin, Phillip H.
    SOUTHEASTCON 2017, 2017,
  • [34] User Authentication for the Internet of Things
    Stajano, Frank
    Lomas, Mark
    SECURITY PROTOCOLS XXVI, 2018, 11286 : 209 - 213
  • [35] On the Authentication of Devices in the Internet of Things
    Sharaf-Dabbagh, Yaman
    Saad, Walid
    2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2016,
  • [36] Authentication and authorization infrastructures (AAls): a comparative survey
    Lopez, J
    Oppliger, R
    Pernul, G
    COMPUTERS & SECURITY, 2004, 23 (07) : 578 - 590
  • [37] Enhancing MQTT security for internet of things: Lightweight two-way authorization and authentication with advanced security measures
    Bangare, Pallavi S.
    Patil, Kishor P.
    Measurement: Sensors, 2024, 33
  • [38] Survey: An Overview of Lightweight RFID Authentication Protocols Suitable for the Maritime Internet of Things
    Mudra, Glen
    Cui, Hui
    Johnstone, Michael N.
    ELECTRONICS, 2023, 12 (13)
  • [39] A Survey: Authentication Protocols for Wireless Sensor Network in the Internet of Things; Keys and Attacks
    Alrababah, Doaa
    Al-Shammari, Esraa
    Alsuht, Areej
    2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2017, : 270 - 276
  • [40] OSAA: On-Demand Source Authentication and Authorization in the Internet
    Dabinski, Bartlomiej
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY, ISAT 2019, PT I, 2020, 1050 : 219 - 230