Smart City Gnosys

Smart city article details

Title An Exhaustive Survey On Authentication Classes In The Iot Environments
ID_Doc 8135
Authors Dargaoui S.; Azrour M.; Allaoui A.E.; Guezzaz A.; Alabdulatif A.; Alnajim A.
Year 2024
Published Indonesian Journal of Electrical Engineering and Informatics, 12, 1
DOI http://dx.doi.org/10.52549/ijeei.v12i1.5170
Abstract In today's world, devices are interconnected across various fields, ranging from intelligent buildings and smart cities to Industry 4.0 and smart healthcare. IoT security is still the biggest obstacle to deployment despite the exponential growth of IoT usage in our world. The principal objective of IoT security is to warrant the accessibility of services offered by an IoT environment, protect privacy, and confidentiality, and ensure the safety of IoT users, infrastructures, data, and devices. Authentication has become a top priority for everyone because it is the first line of defense against security threats and can allow or prevent users from accessing resources according to their legitimacy. Consequently, studying and researching authentication issues within IoT is extremely important. Our paper provides a comparative study of current IoT security research; it analyzes recent authentication protocols from 2018 to 2024. This survey’s goal is to provide an IoT security research summary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. © 2024 Institute of Advanced Engineering and Science. All rights reserved.
Author Keywords Attacks; Authentication; Cryptography; Internet of Things; Security


Similar Articles


Id Similarity Authors Title Published
32963 View0.933Dargaoui S.; Azrour M.; El Allaoui A.; Guezzaz A.; Alabdulatif A.; Alnajim A.Internet Of Things Authentication Protocols: Comparative StudyComputers, Materials and Continua, 79, 1 (2024)
35247 View0.886Ahmed W.K.; Mohammed R.S.Lightweight Authentication Methods In Iot: SurveyProceedings of the 2nd 2022 International Conference on Computer Science and Software Engineering, CSASE 2022 (2022)
4211 View0.877Alotaibi A.; Aldawghan H.; Aljughaiman A.A Review Of The Authentication Techniques For Internet Of Things Devices In Smart Cities: Opportunities, Challenges, And Future DirectionsSensors, 25, 6 (2025)
47934 View0.876Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
8954 View0.873Dargaoui S.; Azrour M.; El Allaoui A.; Amounas F.; Guezzaz A.; Attou H.; Hazman C.; Benkirane S.; Bouazza S.H.An Overview Of The Security Challenges In Iot EnvironmentEnvironmental Science and Engineering (2023)
11136 View0.868Sivagami V.M.; Deekshitha M.; Devi N.; Parvathi S.S.Authentication, Authorization, And Anonymization Techniques In The IotSecure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation (2024)
47947 View0.868Hameed A.; Alomary A.Security Issues In Iot: A Survey2019 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies, 3ICT 2019 (2019)
4954 View0.868Vidwans A.; Ramaiya M.A Study And Comparison Of Cryptographic Mechanisms On Data Communication In Internet Of Things (Iot) Network And DevicesLecture Notes in Networks and Systems, 894 (2024)
5283 View0.864Wei Z.; Wei Q.; Geng Y.; Yang Y.A Survey On Iot Security: Vulnerability Detection And ProtectionProceedings of 2024 International Conference on Artificial Intelligence of Things and Computing, AITC 2024 (2025)
5129 View0.859Mohammad Z.; Abusukhon A.; Qattam T.A.A Survey Of Authenticated Key Agreement Protocols For Securing Iot2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, JEEIT 2019 - Proceedings (2019)