Internet of Things Security, Device Authentication and Access Control: A Review

01/09/2019
by   Inayat Ali, et al.
0

The Internet of Things (IoT) is one of the emerging technologies that has grabbed the attention of researchers from academia and industry. The idea behind Internet of things is the interconnection of internet enabled things or devices to each other and to humans, to achieve some common goals. In near future IoT is expected to be seamlessly integrated into our environment and human will be wholly solely dependent on this technology for comfort and easy life style. Any security compromise of the system will directly affect human life. Therefore security and privacy of this technology is foremost important issue to resolve. In this paper we present a thorough study of security problems in IoT and classify possible cyberattacks on each layer of IoT architecture. We also discuss challenges to traditional security solutions such as cryptographic solutions, authentication mechanisms and key management in IoT. Device authentication and access controls is an essential area of IoT security, which is not surveyed so far. We spent our efforts to bring the state of the art device authentication and access control techniques on a single paper.

READ FULL TEXT
research
08/30/2018

Understanding Security Requirements and Challenges in Internet of Things (IoTs): A Review

Internet of Things (IoT) is realized by the idea of free flow of informa...
research
06/12/2020

Physical Layer Security for the Internet of Things: Authentication and Key Generation

A low-complexity, yet secure framework is proposed for protecting the In...
research
09/11/2020

A Smart Home System based on Internet of Things

The Internet of Things (IoT) describes a network infrastructure of ident...
research
07/28/2019

Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement?

Security provisioning has become the most important design consideration...
research
01/21/2019

Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications

The unprecedented proliferation of smart devices together with novel com...
research
09/26/2022

Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing

The few resources available on devices restricted in Internet of Things ...
research
05/29/2019

Putting Things in Context: Securing Industrial Authentication with Context Information

The development in the area of wireless communication, mobile and embedd...

Please sign up or login with your details

Forgot password? Click here to reset