IoT Authentication Protocols: Challenges, and Comparative Analysis

Faculty Science Year: 2024
Type of Publication: ZU Hosted Pages:
Authors:
Journal: ACM Computing Surveys ACM Computing Surveys Volume: 57
Keywords : , Authentication Protocols: Challenges, , Comparative Analysis    
Abstract:
In the ever-evolving information technology landscape, the Internet of Things (IoT) is a groundbreaking concept that bridges the physical and digital worlds. It is the backbone of an increasingly sophisticated interactive environment, yet it is a subject of intricate security challenges spawned by its multifaceted manifestations. Central to securing IoT infrastructures is the crucial aspect of authentication, necessitating a comprehensive examination of its nuances, including benefits, challenges, opportunities, trends, and societal implications. In this article, we thoroughly review the IoT authentication protocols (Aps), addressing the main challenges such as privacy protection, scalability, and human factors that may impact security. Through exacting analysis, we evaluate the strengths and weaknesses of existing APs and conduct a comparative performance analysis to evaluate their effectiveness and scalability in securing IoT environments and devices. At the end of this study, we summarize the main findings and suggest ways to improve the security of IoT devices in the future
   
     
 
       

Author Related Publications

  • AbdulRahman Sami Ismail AbdulHameed, "Optimizing Charging Schedules for WRSNs: A Multi-Criteria Decision-Making Approach with Multiple Charger Vehicles", 2023 International Conference on Microelectronics (ICM), 2024 More
  • AbdulRahman Sami Ismail AbdulHameed, "Understanding Indoor Scene: Spatial Layout Estimation, Scene Classification, and Object Detection", ACM Digital Library, 2018 More
  • AbdulRahman Sami Ismail AbdulHameed, "Synthesizing Plausible Videos by Introducing Favorable Object Pose Using Trajectory Matching", IEEE, 2018 More
  • AbdulRahman Sami Ismail AbdulHameed, "RBEER: Rule-Based Energy-Efficient Routing Protocol for Large-Scale UWSNs", IEEE explore, 2024 More
  • AbdulRahman Sami Ismail AbdulHameed, "Routing protocols classification for underwater wireless sensor networks based on localization and mobility", Springer, 2022 More

Department Related Publications

  • Hany Samih Bayoumi Ibrahim, "Passive and active controllers for suppressing the torsional vibration of multiple-degree-of-freedom system", Sage, 2014 More
  • Ahmed Mohamed Khedr Souliman, "SEP-CS: Effective Routing Protocol for Heterogeneous Wireless Sensor Networks", Ad Hoc & Sensor Wireless Networks, 2012 More
  • Ahmed Mohamed Khedr Souliman, "Minimum connected cover of a query region in heterogeneous wireless sensor networks", Information Sciences, 2013 More
  • Ahmed Mohamed Khedr Souliman, "IBLEACH: intra-balanced LEACH protocol for wireless sensor networks", Wireless Netw, 2014 More
  • Ahmed Mohamed Khedr Souliman, "AGENTS FOR INTEGRATING DISTRIBUTED DATA FOR FUNCTION COMPUTATIONS", Computing and Informatics,, 2012 More
Tweet