Smart City Gnosys

Smart city article details

Title Lightweight Authentication Methods In Iot: Survey
ID_Doc 35247
Authors Ahmed W.K.; Mohammed R.S.
Year 2022
Published Proceedings of the 2nd 2022 International Conference on Computer Science and Software Engineering, CSASE 2022
DOI http://dx.doi.org/10.1109/CSASE51777.2022.9759798
Abstract In recent years, the Internet of Things has gained prominence as a potential communication paradigm with a wide range of applications, including smart cities, smart homes, and intelligent transportation systems. The information gathered by a variety of IoT smart devices may be safely stored on (cloud) servers. The communication between devices in networks has rendered people unable to communicate with one another due to security authentication challenges such as destruction or abuse of IoT devices. In the Internet of Things, security and privacy are important considerations. This paper conducts a review of existing research in the fields of identity management, lightweight authentication, and authorization that applies to the IoT environment. We sift through modern set of papers, classify them, and highlight current IoT security trends and its performance measures. © 2022 IEEE.
Author Keywords Artificial intelligent; blockchain; chaotic map; Elliptic curve; Internet of Things (IoT); lightweight authentication; protocol


Similar Articles


Id Similarity Authors Title Published
4211 View0.908Alotaibi A.; Aldawghan H.; Aljughaiman A.A Review Of The Authentication Techniques For Internet Of Things Devices In Smart Cities: Opportunities, Challenges, And Future DirectionsSensors, 25, 6 (2025)
4954 View0.903Vidwans A.; Ramaiya M.A Study And Comparison Of Cryptographic Mechanisms On Data Communication In Internet Of Things (Iot) Network And DevicesLecture Notes in Networks and Systems, 894 (2024)
47865 View0.897Awad A.I.; Abawajy J.Security And Privacy In The Internet Of Things: Architectures, Techniques, And ApplicationsSecurity and Privacy in the Internet of Things: Architectures, Techniques, and Applications (2021)
4300 View0.892Abiodun O.I.; Abiodun E.O.; Alawida M.; Alkhawaldeh R.S.; Arshad H.A Review On The Security Of The Internet Of Things: Challenges And SolutionsWireless Personal Communications, 119, 3 (2021)
35256 View0.887Rana M.; Mamun Q.; Islam R.Lightweight Cryptography In Iot Networks: A SurveyFuture Generation Computer Systems, 129 (2022)
32963 View0.887Dargaoui S.; Azrour M.; El Allaoui A.; Guezzaz A.; Alabdulatif A.; Alnajim A.Internet Of Things Authentication Protocols: Comparative StudyComputers, Materials and Continua, 79, 1 (2024)
47934 View0.886Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
8135 View0.886Dargaoui S.; Azrour M.; Allaoui A.E.; Guezzaz A.; Alabdulatif A.; Alnajim A.An Exhaustive Survey On Authentication Classes In The Iot EnvironmentsIndonesian Journal of Electrical Engineering and Informatics, 12, 1 (2024)
2933 View0.882Li N.; Liu D.; Nepal S.; Pei G.A Needle In A Haystack: Finding A Suitable Lightweight Iot Authentication Protocol And Improving Its UsabilityProceedings - 2020 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2020 (2020)
25826 View0.878Pandey S.; Bhushan B.Exploring The Viability And Effectiveness Of Lightweight Cryptographic Techniques In Enhancing The Iot Data Security Of Smart CitiesProceedings of International Conference on Computational Intelligence and Sustainable Engineering Solution, CISES 2023 (2023)