IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Survey of Authentication Schemes in the Internet of Things

A Survey of Authentication Schemes in the Internet of Things
View Sample PDF
Author(s): Yasmine Labiod (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Annaba, Algeria), Abdelaziz Amara Korba (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Annaba, Algeria)and Nacira Ghoualmi-Zine (Networks and Systems Laboratory, Badji Mokhtar Annaba University, Annaba, Algeria)
Copyright: 2021
Pages: 18
Source title: Research Anthology on Blockchain Technology in Business, Healthcare, Education, and Government
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-7998-5351-0.ch093

Purchase

View A Survey of Authentication Schemes in the Internet of Things on the publisher's website for pricing and purchasing information.

Abstract

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.

Related Content

D. Lavanya, Divya Marupaka, Sandeep Rangineni, Shashank Agarwal, Latha Thammareddi, T. Shynu. © 2024. 17 pages.
A. Sabarirajan, N. Arunfred, V. Bini Marin, Shouvik Sanyal, Rameshwaran Byloppilly, R. Regin. © 2024. 14 pages.
P.S. Venkateswaran, M. Lishmah Dominic, Shashank Agarwal, Himani Oberai, Ila Anand, S. Suman Rajest. © 2024. 16 pages.
Thangaraja Arumugam, R. Arun, R. Anitha, P. L. Swerna, R. Aruna, Vimala Kadiresan. © 2024. 12 pages.
Thangaraja Arumugam, R. Arun, Sundarapandiyan Natarajan, Kiran Kumar Thoti, P. Shanthi, Uday Kiran Kommuri. © 2024. 15 pages.
H. Hajra, G. Jayalakshmi. © 2024. 17 pages.
H. Hajra, G. Jayalakshmi. © 2024. 19 pages.
Body Bottom