skip to main content
Primo Search
Search in: Busca Geral

A Survey of Internet of Things (IoT) Authentication Schemes

El-Hajj, Mohammed ; Fadlallah, Ahmad ; Chamoun, Maroun ; Serhrouchni, Ahmed

Sensors (Basel, Switzerland), 2019-03, Vol.19 (5), p.1141 [Periódico revisado por pares]

Switzerland: MDPI

Texto completo disponível

Citações Citado por
  • Título:
    A Survey of Internet of Things (IoT) Authentication Schemes
  • Autor: El-Hajj, Mohammed ; Fadlallah, Ahmad ; Chamoun, Maroun ; Serhrouchni, Ahmed
  • Assuntos: authentication ; Computer Science ; Internet of Things ; IoT ; security
  • É parte de: Sensors (Basel, Switzerland), 2019-03, Vol.19 (5), p.1141
  • Notas: ObjectType-Article-1
    SourceType-Scholarly Journals-1
    ObjectType-Feature-2
    content type line 23
    PMCID: PMC6427355
    This paper is an extended version of two papers previously published by the authors in 2017. The first one is: In Proceedings of the 2017 1st Cyber Security in Networking Conference (CSNet), Rio de Janeiro, Brazil, 18–20 October 2017; pp. 1–3 and the second one is: In Proceedings of the 2017 IEEE 15th Student Conference on Research and Development (SCOReD), Putrajaya, Malaysia, 13–14 December 2017; pp. 67–71. (check the references section).
  • Descrição: The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental first step for researchers and developers addressing this domain.
  • Editor: Switzerland: MDPI
  • Idioma: Inglês

Buscando em bases de dados remotas. Favor aguardar.