Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Article type: Research Article
Authors: Saurabh, a | Sharma, Chiraga | Khan, Shakirb; c | Mahajan, Shubhamc; d; e | Alsagri, Hatoon S.b | Almjally, Abrarb | Alabduallah, Bayan Ibrahimmf; * | Ansari, Asrar Ahmadg
Affiliations: [a] Department of Computer Science & Engineering, Lovely Professional University, Jalandhar, India | [b] College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia | [c] Department of Computer Science and Engineering, University Centre for Research and Development (UCRD), Chandigarh University, Mohali, India | [d] Ajeenkya D Y Patil University, Pune, Maharashtra, (iNurture Education Solutions Pvt. Ltd., Bangalore), Pune, Maharashtra, India | [e] MEU Research Unit, Middle East University, Amman, Jordan | [f] Department of Information System, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia | [g] Researcher/E-Learning Consultant Medical Education Department, College of Medicine, King Saud University, Bayan Ibrahimm Alabduallah, Riyadh, Saudi Arabia
Correspondence: [*] Corresponding author. Bayan Ibrahimm Alabduallah, Department of Information System, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh 11564, Saudi Arabia. E-mail: bialabdullah@pnu.edu.sa.
Abstract: With the ever-increasing demand for IoT Devices which enable all objects to connect and exchange information in applications such as healthcare applications, Industry 4.0, smart cities and smart homes, etc. IoT devices play a crucial role in our day-to-day life like homes, offices, healthcare, wearable, and agriculture. With the development of IoT devices, securing device-to-device communication has attracted more and more attention and we need to ensure the privacy and security of data amongst these IoT devices. User authentication has emerged as a major security concern while connecting IoT devices and the cloud. Many authentication schemes like mutual authentication, group authentication have been proposed to ensure only authenticated users and with very high confidence we can rely on the decision-making process. Symmetric key based as well as Asymmetric key-based solutions have been proposed but due to the resource constraint nature of the IoT devices designing lightweight, robust, provably secure authentication schemes is a big challenge. This paper discusses the various authentication techniques designed for low-powered IoT devices and proposes a lightweight authentication scheme for IoT.
Keywords: IoT, authentication, lightweight, Industry 4.0, and security
DOI: 10.3233/JIFS-232388
Journal: Journal of Intelligent & Fuzzy Systems, vol. 45, no. 4, pp. 5423-5439, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl