Survey of Authentication and Authorization for the Internet of Things

被引:47
|
作者
Trnka, Michal [1 ]
Cerny, Tomas [2 ]
Stickney, Nathaniel [2 ]
机构
[1] Czech Tech Univ, FEE, Dept Comp Sci, Prague, Czech Republic
[2] Baylor Univ, Dept Comp Sci, Waco, TX 76798 USA
关键词
ACCESS-CONTROL MODEL; PRIVACY; ARCHITECTURE; SECURITY; MOBILE; SYSTEM; TRUST;
D O I
10.1155/2018/4351603
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things is currently getting significant interest from the scientific community. Academia and industry are both focused on moving ahead in attempts to enhance usability, maintainability, and security through standardization and development of best practices. We focus on security because of its impact as one of the most limiting factors to wider Internet of Things adoption. Numerous research areas exist in the security domain, ranging from cryptography to network security to identity management. This paper provides a survey of existing research applicable to the Internet of Things environment at the application layer in the areas of identity management, authentication, and authorization. We survey and analyze more than 200 articles, categorize them, and present current trends in the Internet of Things security domain.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] A Lightweight Authentication Protocol for Internet of Things
    Lee, Jun-Ya
    Lin, Wei-Cheng
    Huang, Yu-Hung
    2014 INTERNATIONAL SYMPOSIUM ON NEXT-GENERATION ELECTRONICS (ISNE), 2014,
  • [42] Privacy, Discovery, and Authentication for the Internet of Things
    Wu, David J.
    Taly, Ankur
    Shankar, Asim
    Boneh, Dan
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 301 - 319
  • [43] Efficient Multicast Authentication in Internet of Things
    Bamasag, Omaimah
    Toumi, Kamal Youcef
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 429 - 435
  • [44] Research of authentication techniques for the Internet of things
    Yan H.
    Wang L.
    Tongxin Xuebao/Journal on Communications, 2020, 41 (07): : 213 - 222
  • [45] An Authentication Protocol for the Medical Internet of Things
    El-Meniawy, Nagwa
    Rizk, Mohamed R. M.
    Ahmed, Magdy A.
    Saleh, Mohamed
    SYMMETRY-BASEL, 2022, 14 (07):
  • [46] Authentication Protocol for Securing Internet of Things
    Maarof, Ahmed
    Senhadji, Mohamed
    Labbi, Zouheir
    Belkasmi, Mostafa
    ICEMIS'18: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ENGINEERING AND MIS, 2018,
  • [47] Lightweight Authentication Scheme for Internet of Things
    Haenel, Arie
    Haddad, Yoram
    Zhang, Zonghua
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [48] Internet of things' authentication and access control
    Liu, Jing
    Xiao, Yang
    Chen, C.L. Philip
    International Journal of Security and Networks, 2012, 7 (04) : 228 - 241
  • [49] A secure authentication scheme for Internet of Things
    Wang, King-Hang
    Chen, Chien-Ming
    Fang, Weicheng
    Wu, Tsu-Yang
    PERVASIVE AND MOBILE COMPUTING, 2017, 42 : 15 - 26
  • [50] Multidomain security authentication for the Internet of things
    Zhang, Qikun
    Zhao, Kunyuan
    Kuang, Xiaohui
    Li, Yongjiao
    Zheng, Yuanpan
    Yuan, Junling
    Wang, Ruifang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (16):