当前位置: X-MOL 学术ACM Comput. Surv. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
IoT Authentication Protocols: Challenges, and Comparative Analysis
ACM Computing Surveys ( IF 23.8 ) Pub Date : 2024-11-30 , DOI: 10.1145/3703444
Amar Alsheavi, Ammar Hawbani, Wajdy Othman, XINGFU WANG, Gamil Qaid, Liang Zhao, Ahmed Al-Dubai, Liu Zhi, A.S. Ismail, Rutvij Jhaveri, Saeed Alsamhi, Mohammed A. A. Al-qaness

In the ever-evolving information technology landscape, the Internet of Things (IoT) is a groundbreaking concept that bridges the physical and digital worlds. It is the backbone of an increasingly sophisticated interactive environment, yet it is a subject of intricate security challenges spawned by its multifaceted manifestations. Central to securing IoT infrastructures is the crucial aspect of authentication, necessitating a comprehensive examination of its nuances, including benefits, challenges, opportunities, trends, and societal implications. In this paper, we thoroughly review the IoT authentication protocols, addressing the main challenges such as privacy protection, scalability, and human factors that may impact security. Through exacting analysis, we evaluate the strengths and weaknesses of existing authentication protocols and conduct a comparative performance analysis to evaluate their effectiveness and scalability in securing IoT environments and devices. At the end of this study, we summarize the main findings and suggest ways to improve the security of IoT devices in the future.

中文翻译:


物联网认证协议:挑战和比较分析



在不断发展的信息技术环境中,物联网 (IoT) 是一个开创性的概念,它连接了物理世界和数字世界。它是日益复杂的交互式环境的支柱,但由于其多方面的表现形式,它却是一个错综复杂的安全挑战的主题。保护 IoT 基础设施的核心是身份验证的关键方面,因此需要全面检查其细微差别,包括好处、挑战、机遇、趋势和社会影响。在本文中,我们全面回顾了 IoT 身份验证协议,解决了可能影响安全性的主要挑战,例如隐私保护、可扩展性和人为因素。通过严格的分析,我们评估现有身份验证协议的优缺点,并进行比较性能分析,以评估它们在保护 IoT 环境和设备方面的有效性和可扩展性。在本研究的最后,我们总结了主要发现,并提出了未来提高 IoT 设备安全性的方法。
更新日期:2024-11-30
down
wechat
bug