Smart City Gnosys

Smart city article details

Title Internet Of Things Authentication Protocols: Comparative Study
ID_Doc 32963
Authors Dargaoui S.; Azrour M.; El Allaoui A.; Guezzaz A.; Alabdulatif A.; Alnajim A.
Year 2024
Published Computers, Materials and Continua, 79, 1
DOI http://dx.doi.org/10.32604/cmc.2024.047625
Abstract Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still the biggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services provided by an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures, data, and devices. Authentication, as the first line of defense against security threats, becomes the priority of everyone. It can either grant or deny users access to resources according to their legitimacy. As a result, studying and researching authentication issues within IoT is extremely important. As a result, studying and researching authentication issues within IoT is extremely important. This article presents a comparative study of recent research in IoT security; it provides an analysis of recent authentication protocols from 2019 to 2023 that cover several areas within IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security research summary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. It illustrates that the resistance of protocols against attacks, and their computational and communication cost are linked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemes and provides some future research directions. © 2024 Tech Science Press. All rights reserved.
Author Keywords Attacks; authentication; cryptography; Internet of Things; security


Similar Articles


Id Similarity Authors Title Published
8135 View0.933Dargaoui S.; Azrour M.; Allaoui A.E.; Guezzaz A.; Alabdulatif A.; Alnajim A.An Exhaustive Survey On Authentication Classes In The Iot EnvironmentsIndonesian Journal of Electrical Engineering and Informatics, 12, 1 (2024)
4954 View0.907Vidwans A.; Ramaiya M.A Study And Comparison Of Cryptographic Mechanisms On Data Communication In Internet Of Things (Iot) Network And DevicesLecture Notes in Networks and Systems, 894 (2024)
5129 View0.891Mohammad Z.; Abusukhon A.; Qattam T.A.A Survey Of Authenticated Key Agreement Protocols For Securing Iot2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, JEEIT 2019 - Proceedings (2019)
35247 View0.887Ahmed W.K.; Mohammed R.S.Lightweight Authentication Methods In Iot: SurveyProceedings of the 2nd 2022 International Conference on Computer Science and Software Engineering, CSASE 2022 (2022)
543 View0.887Savithri G.; Mohanta B.K.; Kumar Dehury M.A Brief Overview On Security Challenges And Protocols In Internet Of Things Application2022 IEEE International IOT, Electronics and Mechatronics Conference, IEMTRONICS 2022 (2022)
4211 View0.885Alotaibi A.; Aldawghan H.; Aljughaiman A.A Review Of The Authentication Techniques For Internet Of Things Devices In Smart Cities: Opportunities, Challenges, And Future DirectionsSensors, 25, 6 (2025)
5219 View0.88Sobin C.C.A Survey On Architecture, Protocols And Challenges In IotWireless Personal Communications, 112, 3 (2020)
47934 View0.88Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
2933 View0.88Li N.; Liu D.; Nepal S.; Pei G.A Needle In A Haystack: Finding A Suitable Lightweight Iot Authentication Protocol And Improving Its UsabilityProceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020 (2020)
5123 View0.877Zhang W.; Zeng F.; Tao Y.; Li X.A Survey For Security Of Iot Wireless Protocols; [物联网无线协议安全综述]Journal of Cyber Security, 7, 2 (2022)