2020
DOI: 10.13052/jcsm2245-1439.932
|View full text |Cite
|
Sign up to set email alerts
|

Object Authentication in the Context of the Internet of Things: A Survey

Abstract: Internet of Things (IoT) is considered as the future of the Internet that connects billions of objects all together. Trusted communication between these objects is a crucial requirement for the wide deployment of IoT services. Consequently, effective authentication procedures should be applied between the communicating objects. This paper provides a comprehensive survey of object authentication in the IoT. The survey aims to direct future researchers in the field of IoT object authentication by delving… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 78 publications
0
3
0
Order By: Relevance
“…A comparison between these techniques according to the used evaluation models and their security analysis is outlined. Saadeh et al in [61] targeted object authentication over IoT by presenting a comprehensive survey of schemes that addressed this domain. The aim is to provide guidance for future researchers in how to grab the details of such authentication schemes especially in the context of IoT.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A comparison between these techniques according to the used evaluation models and their security analysis is outlined. Saadeh et al in [61] targeted object authentication over IoT by presenting a comprehensive survey of schemes that addressed this domain. The aim is to provide guidance for future researchers in how to grab the details of such authentication schemes especially in the context of IoT.…”
Section: Related Workmentioning
confidence: 99%
“…Different authentication schemes have been proposed for wireless mobile communication and wireless sensor networks [3]. The significant requirements for a feasible authentication scheme development are: Lightweight algorithms and protocols for security, key management and distribution, mutual authentication, and using certificateless authentication that depends on cryptographic hash functions to reduce energy consumption and computation cost in order to be suitable to constrained devices [61]. The main contributions of this paper involve:…”
Section: Introductionmentioning
confidence: 99%
“…As the number of attacks is increasing, more research is conducted to increase the security of IoT network and devices. For example, some authentication protocols are proposed by taking into consideration the limitation of resources in IoT devices [4] [5]. Others, propose different architectures design to increase the security such as [6] [7].…”
Section: Introductionmentioning
confidence: 99%