DOI QR코드

DOI QR Code

Open Research Problem for effective IoT Authentication

  • Mihir Mehta (Gujarat Technological Universit) ;
  • Kajal Patel (VGEC - Chandkheda)
  • Received : 2024.08.05
  • Published : 2024.08.30

Abstract

IoT is collection of different "things" which are associated with open web. As all the things are connected to the Internet, it offers convenience to end users for accessing the resources from "Any Where, Any Time" throughout the globe. At the same time, open nature of IoT provides a fertile ground to an intruder for launching different security related threats. If we can no apply proper security safeguards to the IoT System, then it will be not useful to society. Authentication, Encryption, Trust Management and Secure Routing are different domains to offer security in IoT system. Among them, Authentication is very much important security service as it validates device identity before granting access to system services/ resources. Existing IoT Authentication algorithms are fail to verify device identity in unambiguous way. They are vulnerable to different security threats such as Key Stolen threat, MITM threat and Location Spoofing threat. So, it is a demand of time to design an efficient and secure Multi-factor IoT algorithm which can offer better security and validate device identity in unambiguous way.

Keywords

References

  1. Santhosh Krishna B V, Gnanasekaran T.: A Systematic Study of Security Issues in Internet-of-Things (IoT), presented at IEEE International conference on I-SMAC (2017).
  2. Chang-le Zhong, Zhen Zhu, Ren-gen Huang. C: Study on the IOT Architecture and Access Technology, presented at IEEE 16th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (2017).
  3. Vangelis Gazis, Manuel Goertz, Marco Huber, Alessandro Leonardi. C: IoT: Challenges, Projects, Architectures, presented at IEEE 5th International Conference on Intelligence in Next Generation Networks (2015).
  4. Jeffry Voas, Bill Agresti. T: A Closer Look at the IOT "things", published in IEEE Computer Society, Vol. 20, Issue 30, pp. 6-15 (2018).
  5. SulabhBhattarai,Yong Wang. T: End-to-End Trust and Security for Internet of Things Applications", published in IEEE Computer Society (2015).
  6. Mardianabinti Mohamad Noor, Wan Haslina Hassan. T: Current research on Internet of Things (IoT) security: A survey, published in ELSEVEIR Computer Networks, pp. 283-294 (2019).
  7. Tarak Nandy, Norjihan Abdul Ghani, Sananda Bhattacharya. T: Review on Security of Internet of Things Authentication Mechanism, published in IEEE Access, Vol. 7, pp. 151054- 151089 (2019).
  8. Hokeun Kim, Edward A. Lee. T: Authentication and Authorization for the Internet of Things, published in IEEE Computer Society (2017).
  9. Hirofumi Noguchi, Misao Kataoka, Yoji Yamato. T: Device Identification Based on Communication Analysis for the Internet of Things, published in IEEE Access (2019).
  10. Mohammad Wazid, Ashok Kumar Das, VangaOdeluc et al T: Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks, published in IEEE Internet of Things Journal (2017).
  11. Ning Wang, Ting Jiang, Shichaolyet al. T: Physical-Layer Authentication Based on Extreme Learning Machine, published in IEEE Internet of Things Journal, (2016).
  12. Muhammad Naveed Aman, Sachin Taneja et al. T: Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff, published in IEEE Internet of Things Journal (2015).
  13. Prosanta Gope, Biplab Sikdar. T: Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices, IEEE Internet of Things Journal, (2018).
  14. Muhammad Naveed Aman, Mohamed Haroon Basheer, Biplab Sikdar. T: Two factor Authentication for IOT with Location Information, IEEE Internet of Things Journal (2017).
  15. Yan Zhao, Shimming Li, Liehui Jiang. T: Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment, WILEY Hindawai Security and Communication Networks, (2015).
  16. Majid Alotaibi. T: An Enhanced Symmetric Cryptosystem and Biometric-Based Anonymous User Authentication and Session Key Establishment Scheme for WSN", IEEE Access (2015).
  17. Zahoor Ahmed Alizai, Noquia Fatima Tareen, Iqura Jadoon C: Improved IoT Device Authentication Scheme Using Device Capability and Digital Signatures, IEEE International Conference on Applied and Engineering Mathematics (2015).
  18. Vikas Hassija, Vinay Chamolaet al. T: A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures, published in IEEE Access (2019).
  19. Jyoti Deogirikar, Amarsinh Vidhate T: Security Attacks in IoT: A Survey presented at IEEE International conference on I-SMAC (2017).
  20. Chang-le Zhong, Zhen Zhu, Ren-gen Huang. C: Study on the IOT Architecture and Access Technology, presented at IEEE 16th International Symposium on Distributed Computing and Applications to Business, Engineering and Science, (2017).
  21. Daniel A.F.Saravia, Paul Crocker. T: PRISECComparison of Symmetric key algorithms for IOT, Sensors (2019).
  22. Lin Wang, Zhou Chang. T: Security Enhancement on a Light Weight Authentication Scheme with Anonymity Fog Computing Architecture, Vol.8, IEEE Access (2020).
  23. Yuichi Kawamoto, Hiroki Nishiyama T.: Effectively Collecting Data for the Location-Based Authentication in Internet of Things, IEEE System Journal, (2015).
  24. Omar Alfandi, Arne Bochem. T: Secure and Authenticated Data Communication in Wireless Sensor Networks, Sensors (2015).
  25. Adel Ali Ahmed, Waleed Ali Ahmed. T: An Effective Multifactor Authentication Mechanism Based on Combiners of Hash Function over Internet of Things, Sensors (2019)