IoT Authentication Protocols: Challenges, and Comparative Analysis

Faculty Science Year: 2024
Type of Publication: ZU Hosted Pages:
Authors:
Journal: ACM Computing Surveys ACM Computing Surveys Volume: 57
Keywords : , Authentication Protocols: Challenges, , Comparative Analysis    
Abstract:
In the ever-evolving information technology landscape, the Internet of Things (IoT) is a groundbreaking concept that bridges the physical and digital worlds. It is the backbone of an increasingly sophisticated interactive environment, yet it is a subject of intricate security challenges spawned by its multifaceted manifestations. Central to securing IoT infrastructures is the crucial aspect of authentication, necessitating a comprehensive examination of its nuances, including benefits, challenges, opportunities, trends, and societal implications. In this article, we thoroughly review the IoT authentication protocols (Aps), addressing the main challenges such as privacy protection, scalability, and human factors that may impact security. Through exacting analysis, we evaluate the strengths and weaknesses of existing APs and conduct a comparative performance analysis to evaluate their effectiveness and scalability in securing IoT environments and devices. At the end of this study, we summarize the main findings and suggest ways to improve the security of IoT devices in the future
   
     
 
       

Author Related Publications

  • AbdulRahman Sami Ismail AbdulHameed, "Optimizing Charging Schedules for WRSNs: A Multi-Criteria Decision-Making Approach with Multiple Charger Vehicles", 2023 International Conference on Microelectronics (ICM), 2024 More
  • AbdulRahman Sami Ismail AbdulHameed, "Understanding Indoor Scene: Spatial Layout Estimation, Scene Classification, and Object Detection", ACM Digital Library, 2018 More
  • AbdulRahman Sami Ismail AbdulHameed, "Synthesizing Plausible Videos by Introducing Favorable Object Pose Using Trajectory Matching", IEEE, 2018 More
  • AbdulRahman Sami Ismail AbdulHameed, "RBEER: Rule-Based Energy-Efficient Routing Protocol for Large-Scale UWSNs", IEEE explore, 2024 More
  • AbdulRahman Sami Ismail AbdulHameed, "Routing protocols classification for underwater wireless sensor networks based on localization and mobility", Springer, 2022 More

Department Related Publications

  • Rodyna Ahmed Mahmoud, "Proximity structures and grill", ijser, 2013 More
  • Heba Ibrahim Mustafa, "On rough approximations via ideal", Elsevier, 2013 More
  • Heba Ibrahim Mustafa, "Soft Generalized Closed Sets with Respect to an Ideal in Soft Topological Spaces", Natural science publishing USA, 2014 More
  • Heba Ibrahim Mustafa, "Hybridizing Rough Sets and Double Sets (An approach for increasing decision accuracy)", Acta Zhengzhou University Overseas, 2013 More
  • Alaa Hassan Attia Hassan, "On subordination results for certain new classes of analytic functions defined by using Salagean operator", Universiteti i Prishtines, Prishtine, Kosove, 2012 More
Tweet