Taxonomy of authentication techniques in Internet of Things (IoT)

Mohammed El-hajj, Maroun Chamoun, Ahmad Fadlallah, Ahmed Serhrouchni

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

31 Citations (Scopus)

Abstract

Internet of Things (IoT) is slowly but steadily becoming part of different aspects of our lives, with applications ranging from smart homes, to wearable devices, to healthcare, etc. This wide spectrum of applications results in shared data containing large amount of users' private information. The security of such information becomes a paramount concern. The IoT security requirements include data confidentiality, data integrity, authentication, access control, privacy, etc. In particular, authentication of IoT devices has a particular importance given the variety of attacks which might result from its breach [1]. This paper provides a survey of the different authentication schemes proposed in the literature. Through a multi-criteria classification, it compares and analyzes the existing authentication protocols, showing their advantages and disadvantages.
Original languageEnglish
Title of host publication2017 IEEE 15th Student Conference on Research and Development (SCOReD)
Place of PublicationPiscataway, NJ
PublisherIEEE
Pages67-71
Number of pages5
ISBN (Electronic)978-1-5386-2126-4, 978-1-5386-2125-7 (USB)
ISBN (Print)978-1-5386-2127-1
DOIs
Publication statusPublished - 1 Mar 2017
Externally publishedYes
EventIEEE 15th Student Conference on Research and Development, SCOReD 2017 - Wilayah Persekutuan Putrajaya, Malaysia
Duration: 13 Dec 201714 Dec 2017
Conference number: 15

Conference

ConferenceIEEE 15th Student Conference on Research and Development, SCOReD 2017
Abbreviated titleSCOReD 2017
Country/TerritoryMalaysia
CityWilayah Persekutuan Putrajaya
Period13/12/1714/12/17

Keywords

  • Authentication
  • Internet of Things
  • Protocols
  • Conferences
  • Taxonomy
  • Logic gates

Fingerprint

Dive into the research topics of 'Taxonomy of authentication techniques in Internet of Things (IoT)'. Together they form a unique fingerprint.

Cite this