Analysis of authentication techniques in Internet of Things (IoT)

Mohammed El-hajj, Maroun Chamoun, Ahmad Fadlallah, Ahmed Serhrouchni

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

60 Citations (Scopus)


Internet of Things (IoT) is slowly but steadily becoming part of different aspects of our lives, with its applications ranging from smart homes, to wearable devices, to healthcare, etc. This wide spectrum of applications results in shared data containing large amount of users' private information. The security of such information becomes a paramount concern. The IoT security requirements include data confidentiality, data integrity, authentication, access control, privacy, etc. In particular, authentication of IoT devices has a particular importance given the variety of attacks which might result from its breach [1]. This paper provides an analysis of the different authentication schemes proposed in the literature. Through a multi-criteria classification, it compares and analyzes the existing authentication protocols, showing their advantages and disadvantages.
Original languageEnglish
Title of host publication2017 1st Cyber Security in Networking Conference (CSNet)
Place of PublicationPiscataway, NJ
Number of pages3
ISBN (Electronic)978-1-5386-1332-0, 978-1-5386-1331-3 (USB)
ISBN (Print)978-1-5386-1333-7
Publication statusPublished - 20 Oct 2017
Externally publishedYes
Event1st Cyber Security in Networking Conference, CSNet 2017 - Rio de Janeiro, Brazil
Duration: 18 Oct 201720 Oct 2017
Conference number: 1


Conference1st Cyber Security in Networking Conference, CSNet 2017
Abbreviated titleCSNet
CityRio de Janeiro
Internet address


  • Authentication
  • Internet of Things
  • Cryptography
  • Protocols
  • Data privacy
  • Ad hoc networks


Dive into the research topics of 'Analysis of authentication techniques in Internet of Things (IoT)'. Together they form a unique fingerprint.

Cite this