2017
DOI: 10.1155/2017/6562953
View full text | Cite
|
Sign up to set email alerts
|

Abstract: In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). Threat models, countermeasures, and formal security verif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
126
0
1

Year Published

2018
2018
2020
2020

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 194 publications
(127 citation statements)
references
References 275 publications
(839 reference statements)
0
126
0
1
Order By: Relevance
“…Low-level approaches are those that describe threats in detail. Such approaches may be based on the use of the list of attacks [15][16][17][18][19] or the list of attack scenarios [20]. Some approaches come down to analyzing the exploitation of vulnerabilities in the system [21][22][23].…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we construct a biometric authentication system by using the BB-KDF. A secure and efficient authentication is required to support a trusted communication in various environments such as mobile cloud computing [52], IoT [53], and wireless sensor networks [54]. The proposed authentication system is highly feasible in these environments since it is not only comparatively efficient, but also applicable to low-performance devices which do not provide secure storage (such as TPM) for cryptographic keys.…”
Section: Authentication Systemmentioning
confidence: 99%
“…Mobile devices are going to take a central role in the Internet of Things era [1]. Smart phones, assisted from the 5G technology that provides continuous and reliable connectivity [2], will soon be able to support applications across a wide variety of domains like homecare, healthcare, social networks, safety, environmental monitoring, e-commerce and transportation [3]. Storage capabilities of mobile phones increase rapidly, and phones can today generate and store large amounts of different types of data.…”
Section: Introductionmentioning
confidence: 99%
“…As the basis of the threat model, the authors most often use the list of attacks [11][12][13][14][15], the list of attack scenarios [16], the description of exploitation of vulnerabilities [17,18], and the description of attackers [19]. This approach does not allow to determine the list of threats.…”
Section: Introductionmentioning
confidence: 99%
“…On one hand, most devices are constrained in terms of energy supply and computational capacities preventing them from running complex security protocols like EPS-AKA [7,8,9]. On the other hand, the tremendous number of attachment requests from these devices may induce signaling congestion by increasing the connectivity provider's CN load [10,11]. According to [12], the "Attach" procedure, that includes AAC, is indeed one of the most expensive procedures in terms of load on the CN.…”
mentioning
confidence: 99%