2018
DOI: 10.1155/2018/4351603
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Authentication and Authorization for the Internet of Things

Abstract: The Internet of Things is currently getting significant interest from the scientific community. Academia and industry are both focused on moving ahead in attempts to enhance usability, maintainability, and security through standardization and development of best practices. We focus on security because of its impact as one of the most limiting factors to wider Internet of Things adoption. Numerous research areas exist in the security domain, ranging from cryptography to network security to identity management. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 65 publications
(46 citation statements)
references
References 72 publications
0
41
0
2
Order By: Relevance
“…At this step, the test results will be processed to be more informative. Data samples are eight (8) in total for each combination scheme. It was looked for an average value so that they can be easily compared with other combination schemes.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…At this step, the test results will be processed to be more informative. Data samples are eight (8) in total for each combination scheme. It was looked for an average value so that they can be easily compared with other combination schemes.…”
Section: Discussionmentioning
confidence: 99%
“…Authentication is a very important process because besides maintaining information from unauthorized users. It also maintains the integrity data [7] [8]. The use of algorithms and hashing techniques is needed to help the authentication process so that they can minimize the occurrence of broken data by the attacker.…”
Section: Introductionmentioning
confidence: 99%
“…As security and privacy are two of the most critical aspects discussed in the current IoT systems [19]- [22], authentication schemes and methods are assessed as part of the QA process. A recent systematic literature review by Velasquez et al [23] analyzes and categorizes the current authentication methods applicable to IoT systems.…”
Section: Motivation and Related Workmentioning
confidence: 99%
“…C. RADIUS Remote Authentication Dial in User Service (RADIUS) is an AAA protocol (authentication, authorization, and accounting) for applications such as network access or IP mobility. RADIUS is usually used for network devices such as routers, modem servers, switches [9]. RADIUS is currently are standard for remote authentication and accounting.…”
Section: B Pfsensementioning
confidence: 99%
“…Whereas accounting is when a user has entered the network using various resources and services provided, the network administrator needs to make information tracks or commonly called logs. This log will enable network administrators to maintain, monitor user activities [9].…”
Section: G Authentication Authorization Accounting (Aaa)mentioning
confidence: 99%