Authentication Protocols for Internet of Things: A Comprehensive Survey

De Montfort University Open Research Archive

Show simple item record Ferrag, Mohamed Amine en Maglaras, Leandros en Janicke, Helge en Jiang, Jianmin en Shu, Lei en 2017-12-19T11:37:09Z 2017-12-19T11:37:09Z 2017-11-06
dc.identifier.citation Ferrag, M.A. et al. (2017) Authentication Protocols for Internet of Things: A Comprehensive Survey. Security and Communication Networks, Article ID 6562953 en
dc.description open access article en
dc.description.abstract In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed. en
dc.language.iso en en
dc.publisher Hindawi en
dc.title Authentication Protocols for Internet of Things: A Comprehensive Survey en
dc.type Article en
dc.peerreviewed Yes en
dc.funder n/a en
dc.projectid n/a en
dc.cclicence CC BY en 2017-09-28 en
dc.exception.reason 38f. The output was published as ‘gold’ open access (for example, RCUK-funded projects where an open access article processing charge has been paid). en

Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record