TY - JOUR
T1 - A Survey of Internet of Things (IoT) Authentication Schemes
AU - El-Hajj, Mohammed
AU - Fadlallah, Ahmad
AU - Chamoun, Maroun
AU - Serhrouchni, Ahmed
N1 - Funding Information:
Funding: This project has been jointly funded with the support of the National Council for Scientific Research in Lebanon CNRS-L and Saint Joseph University of Beirut.
Publisher Copyright:
© 2019 by the authors. Licensee MDPI, Basel, Switzerland.
PY - 2019/3/6
Y1 - 2019/3/6
N2 - The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental first step for researchers and developers addressing this domain.
AB - The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental first step for researchers and developers addressing this domain.
KW - Authentication
KW - Internet of Things (IoT)
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=85062615404&partnerID=8YFLogxK
U2 - 10.3390/s19051141
DO - 10.3390/s19051141
M3 - Literature review
C2 - 30845760
AN - SCOPUS:85062615404
SN - 1424-8220
VL - 19
JO - Sensors (Switzerland)
JF - Sensors (Switzerland)
IS - 5
M1 - 1141
ER -