A Survey on IoT Authentication Security Service: Open Issues, Security Threats, and Future Solution Direction

A Survey on IoT Authentication Security Service: Open Issues, Security Threats, and Future Solution Direction

Mihir Mehta, Kajal Patel
DOI: 10.4018/IJSSSP.295101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Internet of things is becoming the most important technology now a days and it is next era of communication. By the use of IOT, various physical things can create, send and receive the data seamlessly. Different IoT applications' main focus is to automate the maximum tasks so with minimum human intervention efficiency and productivity can be increased. "Things" are directly connected with the Open Web, so any intruder can easily become the part of the network and can launch different attacks. So, to increase the level of comfort and efficiency, high security policy in terms of the authentication is required. Existing authentication methods can not be deployed on "Things" as they require high amount of resources and because of that life span of the network will be decreased. In this paper, we have discussed different security threats present at each IoT layer, existing research done in this domain, research gap in existing identity validation methods and also we have find out the future work directions to enhance IoT Security in terms of accurate validation of device identity.
Article Preview
Top

1. Introduction

Internet of Things (IOT) is a gathering of interconnected objects and humans. IOT devices can smartly communicate with each other without human intervention. IOT empowers individuals and objects to be related at whatever point, any place with anything and anyone, ideally using any way/organize and any help” (Santosh, 2017). A conclusive objective of IOT is to make “A prevalent World for individuals”, where inquiries around us perceive what we like, what we need and what we require and from now on act fittingly without unequivocal headings. (Chen Chu, 2017).

There are sensor, aggregator, communication channel, external utility and decision trigger. A sensor is an electronic utility that appraisals physical properties, for instance, temperature, speeding up, weight, sound, zone, proximity, character, and so on. The role of aggregator is to manage and accumulate the data. Communication channel gives a medium by means of which information can travel. External utility is equipment or programming item/administration which can be obtained from outsider merchants. Models are cloud, cell phones, databases and so on. A decision trigger generates the final output needed to fulfill the reason, details, and prerequisite of a specific IOT (Chen Chu, 2017).

1.1 Architecture of Internet of Things

  • IOT Architecture generally comprises of three layers: Perception layer, Network layer and Application layer (Manual, 2015).

  • Perception layer: It is bottom most layer in IOT architecture. It includes various physical IOT Sensors and actuators to collect the data and to aggregate them. It also does some preliminary processing on gathered data (Manual, 2015).

  • Network layer: It is middle layer in three tiers IOT Architecture. It is also called as Transmission layer and answerable for moving the data assembled from Perception layer to the Application layer rapidly and dependably (Manual, 2015).

  • Application layer: It offers services to end users for specific purpose. For example, the application layer can give temperature and air stickiness estimations to the clients requesting such information (Manual, 2015).

Complete Article List

Search this Journal:
Reset
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 1 Issue (2023)
Volume 13: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 12: 2 Issues (2021)
Volume 11: 2 Issues (2020)
Volume 10: 2 Issues (2019)
Volume 9: 4 Issues (2018)
View Complete Journal Contents Listing