Taxonomy of authentication techniques in Internet of Things (IoT) - Télécom Paris Accéder directement au contenu
Communication Dans Un Congrès Année : 2017

Taxonomy of authentication techniques in Internet of Things (IoT)

Résumé

Internet of Things (IoT) is slowly but steadily becoming part of different aspects of our lives, with applications ranging from smart homes, to wearable devices, to healthcare, etc. This wide spectrum of applications results in shared data containing large amount of users' private information. The security of such information becomes a paramount concern. The IoT security requirements include data confidentiality, data integrity, authentication, access control, privacy, etc. In particular, authentication of IoT devices has a particular importance given the variety of attacks which might result from its breach [1]. This paper provides a survey of the different authentication schemes proposed in the literature. Through a multi-criteria classification, it compares and analyzes the existing authentication protocols, showing their advantages and disadvantages.
Fichier non déposé

Dates et versions

hal-03289809 , version 1 (19-07-2021)

Identifiants

Citer

Mohammed El-Hajj, Maroun Chamoun, Ahmad Fadlallah, Ahmed Serhrouchni. Taxonomy of authentication techniques in Internet of Things (IoT). 2017 IEEE 15th Student Conference on Research and Development (SCOReD), Dec 2017, Wilayah Persekutuan Putrajaya,, Malaysia. pp.67-71, ⟨10.1109/SCORED.2017.8305419⟩. ⟨hal-03289809⟩
57 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More