2019
DOI: 10.1109/access.2019.2947723
|View full text |Cite
|
Sign up to set email alerts
|

Review on Security of Internet of Things Authentication Mechanism

Abstract: Internet of things (IoT) is considered as a collection of heterogeneous devices, such as sensors, Radio-frequency identification (RFID) and actuators, which form a huge network, enabling non-internet components in the network to produce a better world of services, like smart home, smart city, smart transportation, and smart industries. On the other hand, security and privacy are the most important aspects of the IoT network, which includes authentication, authorization, data protection, network security, and a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 105 publications
(33 citation statements)
references
References 120 publications
(148 reference statements)
0
33
0
Order By: Relevance
“…On the one hand, the primary purpose of attacks on the internet of drones (IoD) network just like other typical attacks is to gain access and alter the attacked messages for fulfilling the needs of the attacker [77,[81][82][83]. On the other hand, attacks on the drone compared to the typical cyber-attacks usually occur due to the severe design loopholes and lack of wireless security protection mechanisms.…”
Section: Attacks On the Internet Of Drones Networkmentioning
confidence: 99%
“…On the one hand, the primary purpose of attacks on the internet of drones (IoD) network just like other typical attacks is to gain access and alter the attacked messages for fulfilling the needs of the attacker [77,[81][82][83]. On the other hand, attacks on the drone compared to the typical cyber-attacks usually occur due to the severe design loopholes and lack of wireless security protection mechanisms.…”
Section: Attacks On the Internet Of Drones Networkmentioning
confidence: 99%
“…A systematic review study [29] investigated hardware and software-based security measures for IoT mobile computing devices. In [30], the authors highlighted several authentication methods for IoT and discussed various security verification mechanisms. They also provided future directions for research on authentication mechanisms.…”
Section: A Related Workmentioning
confidence: 99%
“…Hassija et al, [27] Presents security solutions using fog, edge computing, block-chain and ML approaches for IoT       2019 Hussain et al, [44] Provides and analyzes learning-based security measures for IoT       2020 Sharma et al, [28] Presents solutions for security, privacy, and trust for Mobile-IoT       2019 Nandy et al, [30] Highlights several authentication methods for IoT…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, to produce the location of the vehicle, it consumes enormous of unusual energy. On the other hand, nowadays vehicles use a lot of security [2] features such as authentication protection [3], intrusion detection [4] and so on, which consumes extra energies from the vehicles limited sources. Moreover, network issues cannot be negligible like no connectivity, poor signal, and change of the coverage of the base stations.…”
Section: Introductionmentioning
confidence: 99%