skip to main content
10.1145/3607720.3607723acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnissConference Proceedingsconference-collections
research-article

Authentication in Internet of Things: State of Art

Published: 13 November 2023 Publication History

Abstract

Internet of Things (IoT) is a system of wireless electronics that may visualize and control much of the world that surrounds us. This new concept brings with it a broad range of research challenges. Rather, the highly critical challenge of IoT networks is security and particularly authentication. This paper consists of an exhaustive study about authentication in the IoT environment. Accordingly, we present analysis result of a comparison study between eleven IoT authentication schemes. The main criteria of our comparison are cryptography techniques, security services provided, resistance against attacks and computational cost. At the end, this paper will highlight the weaknesses of current IoT authentication and propose future research directions.

References

[1]
Ali, I., Sabir, S. and Ullah, Z. 2019. Internet of things security, device authentication and access control: a review. arXiv preprint arXiv:1901.07309. (2019).
[2]
Architecting a connected future: 2019. https://www.iso.org/cms/render/live/en/sites/isoorg/contents/news/2019/01/Ref2361.html. Accessed: 2023-02-03.
[3]
Atwady, Y. and Hammoudeh, M. 2017. A survey on authentication techniques for the internet of things. Proceedings of the International Conference on Future Networks and Distributed Systems (2017).
[4]
Azrour, M., Mabrouki, J. and Chaganti, R. 2021. New efficient and secured authentication protocol for remote healthcare systems in cloud-iot. Security and Communication Networks. 2021, (2021), 1–12.
[5]
Azrour, M., Mabrouki, J., Farhaoui, Y. and Guezzaz, A. 2021. Security analysis of Nikooghadam ’s authentication protocol for cloud-IoT. Intelligent Systems in Big Data, Semantic Web and Machine Learning. Springer. 261–269.
[6]
Azrour, M., Mabrouki, J., Guezzaz, A. and Farhaoui, Y. 2021. New enhanced authentication protocol for internet of things. Big Data Mining and Analytics. 4, 1 (2021), 1–9.
[7]
Azrour, M., Mabrouki, J., Guezzaz, A. and Kanwal, A. 2021. Internet of things security: challenges and key issues. Security and Communication Networks. 2021, (2021), 1–11.
[8]
Azrour, M., Ouanan, M., Farhaoui, Y. and Guezzaz, A. 2019. Security analysis of Ye authentication protocol for Internet of Things. Big Data and Smart Digital Environment (2019), 67–74.
[9]
Butt, T.M., Riaz, R., Chakraborty, C., Rizvi, S.S. and Paul, A. 2021. Cogent and energy efficient authentication protocol for wsn in iot. Comput. Mater. Contin. 68, (2021), 1877–1898.
[10]
Chaganti, R., Mourade, A., Ravi, V., Vemprala, N., Dua, A. and Bhushan, B. 2022. A particle swarm optimization and deep learning approach for intrusion detection system in internet of medical things. Sustainability. 14, 19 (2022), 12828.
[11]
Chen, C.-T., Lee, C.-C. and Lin, I.-C. 2020. Correction: Efficient and secure three-party mutual authentication key agreement protocol for WSNs in IoT environments. Plos one. 15, 6 (2020), e0234631.
[12]
Dammak, M., Boudia, O.R.M., Messous, M.A., Senouci, S.M. and Gransart, C. 2019. Token-based lightweight authentication to secure IoT networks. 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC) (2019), 1–4.
[13]
Dargaoui, S., Azrour, M., El Allaoui, A., Amounas, F., Guezzaz, A., Attou, H., Hazman, C., Benkirane, S. and Bouazza, S.H. 2023. An Overview of the Security Challenges in IoT Environment. Advanced Technology for Smart Environment and Energy. (2023), 151–160.
[14]
Douiba, M., Benkirane, S., Guezzaz, A. and Azrour, M. 2023. An improved anomaly detection model for IoT security using decision tree and gradient boosting. The Journal of Supercomputing. 79, 3 (2023), 3392–3411.
[15]
El-Hajj, M., Fadlallah, A., Chamoun, M. and Serhrouchni, A. 2019. A survey of internet of things (IoT) authentication schemes. Sensors. 19, 5 (2019), 1141.
[16]
Farooq, M.U., Waseem, M., Mazhar, S., Khairi, A. and Kamal, T. 2015. A review on internet of things (IoT). International journal of computer applications. 113, 1 (2015), 1–7.
[17]
Fattah, G., Mabrouki, J., Ghrissi, F., Azrour, M. and Abrouki, Y. 2022. Multi-Sensor System and Internet of Things (IoT) Technologies for Air Pollution Monitoring. Futuristic Research Trends and Applications of Internet of Things. CRC Press. 101–116.
[18]
Ferrag, M.A., Maglaras, L. and Derhab, A. 2019. Authentication and authorization for mobile IoT devices using biofeatures: Recent advances and future trends. Security and Communication Networks. 2019, (2019).
[19]
Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J. and Shu, L. 2017. Authentication protocols for internet of things: a comprehensive survey. Security and Communication Networks. 2017, (2017).
[20]
Ghosh, A.M. and Grolinger, K. 2020. Edge-cloud computing for Internet of Things data analytics: Embedding intelligence in the edge with deep learning. IEEE Transactions on Industrial Informatics. 17, 3 (2020), 2191–2200.
[21]
Hazman, C., Guezzaz, A., Benkirane, S. and Azrour, M. 2022. lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning. Cluster Computing. (2022), 1–15.
[22]
Hu, B., Tang, W. and Xie, Q. 2022. A Two-factor Security Authentication Scheme for Wireless Sensor Networks in IoT Environments. Neurocomputing. (2022).
[23]
Islam, N., Rashid, M.M., Pasandideh, F., Ray, B., Moore, S. and Kadel, R. 2021. A review of applications and communication technologies for internet of things (Iot) and unmanned aerial vehicle (uav) based sustainable smart farming. Sustainability. 13, 4 (2021), 1821.
[24]
Jabbar, W.A., Kian, T.K., Ramli, R.M., Zubir, S.N., Zamrizaman, N.S., Balfaqih, M., Shepelev, V. and Alharbi, S. 2019. Design and fabrication of smart home with internet of things enabled automation system. IEEE access. 7, (2019), 144059–144074.
[25]
Kandris, D., Nakas, C., Vomvas, D. and Koulouras, G. 2020. Applications of wireless sensor networks: an up-to-date survey. Applied System Innovation. 3, 1 (2020), 14.
[26]
Kaur, D., Kumar, D., Saini, K.K. and Grover, H.S. 2019. An improved user authentication protocol for wireless sensor networks. Transactions on Emerging Telecommunications Technologies. 30, 10 (2019), e3745.
[27]
Kavianpour, S., Shanmugam, B., Azam, S., Zamani, M., Narayana Samy, G. and De Boer, F. 2019. A systematic literature review of authentication in Internet of Things for heterogeneous devices. Journal of Computer Networks and Communications. 2019, (2019).
[28]
Khan, J., Khan, G.A., Li, J.P., AlAjmi, M.F., Haq, A.U., Khan, S., Ahmad, N., Parveen, S., Shahid, M. and Ahmad, S. 2022. Secure smart healthcare monitoring in industrial internet of things (iiot) ecosystem with cosine function hybrid chaotic map encryption. Scientific Programming. 2022, (2022).
[29]
Kou, L., Shi, Y., Zhang, L., Liu, D. and Yang, Q. 2019. A lightweight three-factor user authentication protocol for the information perception of IoT. CMC-Computers, Materials & Continua. 58, 2 (2019), 545–565.
[30]
Kumar, D., Chand, S. and Kumar, B. 2020. Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps. IET Networks. 9, 6 (2020), 315–325.
[31]
Landaluce, H., Arjona, L., Perallos, A., Falcone, F., Angulo, I. and Muralter, F. 2020. A review of IoT sensing applications and challenges using RFID and wireless sensor networks. Sensors. 20, 9 (2020), 2495.
[32]
Mabrouki, J., Azoulay, K., Elfanssi, S., Bouhachlaf, L., Mousli, F., Azrour, M. and El Hajjaji, S. 2022. Smart system for monitoring and controlling of agricultural production by the IoT. IoT and Smart Devices for Sustainable Environment. Springer. 103–115.
[33]
Mabrouki, J., Azrour, M. and Hajjaji, S.E. 2021. Use of internet of things for monitoring and evaluating water's quality: a comparative study. International Journal of Cloud Computing. 10, 5–6 (2021), 633–644.
[34]
Mamdouh, M., Awad, A.I., Khalaf, A.A. and Hamed, H.F. 2021. Authentication and identity management of IoHT devices: achievements, challenges, and future directions. Computers & Security. 111, (2021), 102491.
[35]
Mohy-eddine, M., Guezzaz, A., Benkirane, S. and Azrour, M. 2022. An effective intrusion detection approach based on ensemble learning for IIoT edge computing. Journal of Computer Virology and Hacking Techniques. (2022), 1–13.
[36]
Nandy, T., Idris, M.Y.I.B., Noor, R.M., Kiah, L.M., Lun, L.S., Juma'at, N.B.A., Ahmedy, I., Ghani, N.A. and Bhattacharyya, S. 2019. Review on security of Internet of Things authentication mechanism. IEEE Access. 7, (2019), 151054–151089.
[37]
Oh, J., Yu, S., Lee, J., Son, S., Kim, M. and Park, Y. 2021. A secure and lightweight authentication protocol for IoT-based smart homes. Sensors. 21, 4 (2021), 1488.
[38]
Panda, P.K. and Chattopadhyay, S. 2020. A secure mutual authentication protocol for IoT environment. Journal of Reliable Intelligent Environments. 6, 2 (2020), 79–94.
[39]
Quy, V.K., Hau, N.V., Anh, D.V. and Ngoc, L.A. 2022. Smart healthcare IoT applications based on fog computing: architecture, applications and challenges. Complex & Intelligent Systems. 8, 5 (2022), 3805–3815.
[40]
Righetti, F., Vallati, C. and Anastasi, G. 2018. IoT applications in smart cities: A perspective into social and ethical issues. 2018 IEEE International Conference on Smart Computing (SMARTCOMP) (2018), 387–392.
[41]
Sadeeq, M.M., Abdulkareem, N.M., Zeebaree, S.R., Ahmed, D.M., Sami, A.S. and Zebari, R.R. 2021. IoT and Cloud computing issues, challenges and opportunities: A review. Qubahan Academic Journal. 1, 2 (2021), 1–7.
[42]
Xie, Q., Ding, Z. and Hu, B. 2021. A secure and privacy-preserving three-factor anonymous authentication scheme for wireless sensor networks in Internet of Things. Security and Communication Networks. 2021, (2021).

Cited By

View all
  • (2024)Internet-of-Things-Enabled Smart Agriculture: Security Enhancement Approaches2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)10.1109/IRASET60544.2024.10548705(1-5)Online publication date: 16-May-2024
  • (2024)IoT-Driven Smart Agriculture: Security Issues and Authentication Schemes ClassificationProceeding of the International Conference on Connected Objects and Artificial Intelligence (COCIA2024)10.1007/978-3-031-70411-6_10(61-66)Online publication date: 13-Oct-2024

Index Terms

  1. Authentication in Internet of Things: State of Art
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        NISS '23: Proceedings of the 6th International Conference on Networking, Intelligent Systems & Security
        May 2023
        451 pages
        ISBN:9798400700194
        DOI:10.1145/3607720
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 13 November 2023

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. Attacks
        2. Authentication
        3. Cryptography
        4. Internet of Things
        5. Security

        Qualifiers

        • Research-article
        • Research
        • Refereed limited

        Conference

        NISS 2023

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)44
        • Downloads (Last 6 weeks)4
        Reflects downloads up to 19 Oct 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Internet-of-Things-Enabled Smart Agriculture: Security Enhancement Approaches2024 4th International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET)10.1109/IRASET60544.2024.10548705(1-5)Online publication date: 16-May-2024
        • (2024)IoT-Driven Smart Agriculture: Security Issues and Authentication Schemes ClassificationProceeding of the International Conference on Connected Objects and Artificial Intelligence (COCIA2024)10.1007/978-3-031-70411-6_10(61-66)Online publication date: 13-Oct-2024

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format.

        HTML Format

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media