2017
DOI: 10.1155/2017/6562953
|View full text |Cite
|
Sign up to set email alerts
|

Authentication Protocols for Internet of Things: A Comprehensive Survey

Abstract: In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). Threat models, countermeasures, and formal security verif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
131
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 229 publications
(150 citation statements)
references
References 275 publications
(839 reference statements)
0
131
0
1
Order By: Relevance
“…Low-level approaches are those that describe threats in detail. Such approaches may be based on the use of the list of attacks [15][16][17][18][19] or the list of attack scenarios [20]. Some approaches come down to analyzing the exploitation of vulnerabilities in the system [21][22][23].…”
Section: Related Workmentioning
confidence: 99%
“…Low-level approaches are those that describe threats in detail. Such approaches may be based on the use of the list of attacks [15][16][17][18][19] or the list of attack scenarios [20]. Some approaches come down to analyzing the exploitation of vulnerabilities in the system [21][22][23].…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we construct a biometric authentication system by using the BB-KDF. A secure and efficient authentication is required to support a trusted communication in various environments such as mobile cloud computing [52], IoT [53], and wireless sensor networks [54]. The proposed authentication system is highly feasible in these environments since it is not only comparatively efficient, but also applicable to low-performance devices which do not provide secure storage (such as TPM) for cryptographic keys.…”
Section: Authentication Systemmentioning
confidence: 99%
“…Mobile devices are going to take a central role in the Internet of Things era [1]. Smart phones, assisted from the 5G technology that provides continuous and reliable connectivity [2], will soon be able to support applications across a wide variety of domains like homecare, healthcare, social networks, safety, environmental monitoring, e-commerce and transportation [3]. Storage capabilities of mobile phones increase rapidly, and phones can today generate and store large amounts of different types of data.…”
Section: Introductionmentioning
confidence: 99%