Authentication Protocols for Internet of Things: A Comprehensive Survey
dc.cclicence | CC-BY | en |
dc.contributor.author | Ferrag, Mohamed Amine | en |
dc.contributor.author | Maglaras, Leandros | en |
dc.contributor.author | Janicke, Helge | en |
dc.contributor.author | Jiang, Jianmin | en |
dc.contributor.author | Shu, Lei | en |
dc.date.acceptance | 2017-09-28 | en |
dc.date.accessioned | 2017-12-19T11:37:09Z | |
dc.date.available | 2017-12-19T11:37:09Z | |
dc.date.issued | 2017-11-06 | |
dc.description | open access article | en |
dc.description.abstract | In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed. | en |
dc.exception.reason | The output was published as gold open access | en |
dc.funder | n/a | en |
dc.identifier.citation | Ferrag, M.A. et al. (2017) Authentication Protocols for Internet of Things: A Comprehensive Survey. Security and Communication Networks, Article ID 6562953 | en |
dc.identifier.doi | https://doi.org/10.1155/2017/6562953 | |
dc.identifier.uri | http://hdl.handle.net/2086/15019 | |
dc.language.iso | en | en |
dc.peerreviewed | Yes | en |
dc.projectid | n/a | en |
dc.publisher | Hindawi | en |
dc.researchinstitute | Cyber Technology Institute (CTI) | en |
dc.title | Authentication Protocols for Internet of Things: A Comprehensive Survey | en |
dc.type | Article | en |
Files
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 4.2 KB
- Format:
- Item-specific license agreed upon to submission
- Description: