2022
DOI: 10.3390/app13010404
|View full text |Cite
|
Sign up to set email alerts
|

Key Agreement and Authentication Protocols in the Internet of Things: A Survey

Abstract: The rapid development of Internet of things (IoT) technology has made the IoT applicable in many areas of life and has contributed to the IoT’s improvement. IoT devices are equipped with various sensors that enable them to perform the tasks they were designed for. The use of such devices is associated with securing communication between devices and users. The key stages of communication are the processes of authentication and the process of agreeing on session keys because they are the basis of the subsequent … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 142 publications
0
12
0
Order By: Relevance
“…Table 1 presents a detailed comparison table on recent works in IoT authentication, systematically reviewed for strengths, weaknesses, and future research directions. Contributions include a comprehensive exploration of IoT authentication techniques [14], an investigation of communication protocols for IoT security [15], and a taxonomy tracing the evolution of IoT authentication methods [16]. Kavianpour et al [17] provides a thorough analysis of IoT authentication, encompassing security aspects and identifying future challenges.…”
Section: Related Workmentioning
confidence: 99%
“…Table 1 presents a detailed comparison table on recent works in IoT authentication, systematically reviewed for strengths, weaknesses, and future research directions. Contributions include a comprehensive exploration of IoT authentication techniques [14], an investigation of communication protocols for IoT security [15], and a taxonomy tracing the evolution of IoT authentication methods [16]. Kavianpour et al [17] provides a thorough analysis of IoT authentication, encompassing security aspects and identifying future challenges.…”
Section: Related Workmentioning
confidence: 99%
“…In this methodology, in the first layer a mutual secret key is generated using ECC technique which is shared between users and gateway node (GWN), and in second layer the user initiates the key agreement process and used first layer generated key, wherein the GWN and sensors are generating a mutual session key using a group key. Later, Szymoniak et al 62 37 proposed M-FA protocol utilizing smart card, password, and biometrics for legitimacy verification. These recently designed protocols [35][36][37] claim to provide privacy functionalities to end-users and resilience against several security attacks.…”
Section: Related Workmentioning
confidence: 99%
“…In this methodology, in the first layer a mutual secret key is generated using ECC technique which is shared between users and gateway node (GWN), and in second layer the user initiates the key agreement process and used first layer generated key, wherein the GWN and sensors are generating a mutual session key using a group key. Later, Szymoniak et al 62 illustrated that Vinoth et al protocol is vulnerable to impersonation attack.…”
Section: Related Workmentioning
confidence: 99%
“…In this phase, the requirements for the enhanced authenticated key agreement scheme for WSNs are defined. This includes understanding the security requirements, the network architecture, the types of devices, the communication protocols, and other relevant factors [25].…”
Section: Requirements Analysismentioning
confidence: 99%