A Survey of Internet of Things (IoT) Authentication Schemes

Mohammed El-Hajj, Ahmad Fadlallah, Maroun Chamoun, Ahmed Serhrouchni*

*Corresponding author for this work

Research output: Contribution to journalLiterature reviewAcademicpeer-review

322 Citations (Scopus)
54 Downloads (Pure)

Abstract

The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental first step for researchers and developers addressing this domain.
Original languageEnglish
Article number1141
Number of pages43
JournalSensors (Switzerland)
Volume19
Issue number5
DOIs
Publication statusPublished - 6 Mar 2019
Externally publishedYes

Keywords

  • Authentication
  • Internet of Things (IoT)
  • Security

Fingerprint

Dive into the research topics of 'A Survey of Internet of Things (IoT) Authentication Schemes'. Together they form a unique fingerprint.

Cite this