Abstract

Internet of things is becoming the prime technology currently. By the utilization of IOT, different types of gadgets can interface, link and dialogue data without any interruption. IOT brings intelligence and automation in different areas like agriculture, transportation, industry, health and many more. The end point intention of the IOT operations is to extend opulence and productiveness of the stakeholders. IOT composition includes different sensors and other things which are associated with the web. As Web is open architecture, it lay out favourable ground to Intruders for performing different kinds of security threats. Security and Protection are the symbolic point of view for IOT system. IOT gadgets have limitation in terms of storage and also computational efficiency. So, existing traditional approaches can not be deployed directly into IOT Network. Confidentiality, Integrity and Authentication are pillars for IOT Security. Among them, Authentication service is prime nature because it validates identity of gadgets into the network. If Authentication approach is not secured enough than adversary can gain network control and also can launch various other kinds of attacks into the network. In this review article, a detailed analysis of the security related challenges specially related to Authentication and source of threats in IOT applications is discussed. A brief comparison of recent advancements in various domains of IOT Authentication security is also summarized with suggested enhancements. After doing critical review of existing algorithms; we have derived research gap which can provide opportunity for doing research work in IOT Authentication domain.

Description

A review for IOT authentication – Current research trends and open challenges - ScienceDirect

Links and resources

Tags