دورية أكاديمية

A study of various authentication mechanisms towards the secure Internet of Things networks.

التفاصيل البيبلوغرافية
العنوان: A study of various authentication mechanisms towards the secure Internet of Things networks.
المؤلفون: Vairagade, Rupali Sachin, Brahmananda, S. H.
المصدر: Control & Cybernetics; 2020, Vol. 49 Issue 4, p393-418, 26p
مصطلحات موضوعية: INTERNET of things, INTELLIGENT transportation systems, DATA transmission systems, CLIENT/SERVER computing, CRYPTOGRAPHY
مستخلص: Internet of Things (IoT) plays a major function in the public infrastructure, including power grids, control systems, smart cards, smart cities, intelligent transportation, education, and so on. The IoT networks provide ample benefits arising from transmission of the data between the IoT nodes and the servers. However, security constitutes a major concern in the IoT applications, as secret information may get disclosed to the unauthorized third-party in the network. Thus, secure authentication is a major requirement for managing and communicating with respect to the devices in the IoT environment. In this survey, 50 research papers are reviewed, referring to various authentication protocols used for ensuring adequate security in the network. The authentication methods are categorized on the basis of the security mechanisms, namely, the lightweight approach, the identity approach, the mutual authentication approach, and the cryptography-based authentication approaches, with the challenges faced by these existing methods being reported. Moreover, a simple overview is provided based on authentication protocols, toolsets, and evaluation metrics. Conform to this survey, most of the research articles concentrated on the lightweightbased approaches, and the most commonly applied evaluation metrics include packet loss, throughput, and efficiency. [ABSTRACT FROM AUTHOR]
Copyright of Control & Cybernetics is the property of Sciendo and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Supplemental Index