Abstract
The rapid development of Internet of things (IoT) technology has made the IoT applicable in many areas of life and has contributed to the IoT’s improvement. IoT devices are equipped with various sensors that enable them to perform the tasks they were designed for. The use of such devices is associated with securing communication between devices and users. The key stages of communication are the processes of authentication and the process of agreeing on session keys because they are the basis of the subsequent communication phases. The specially designed security protocols are used to secure communication. These protocols define the course of communication and cryptographic techniques employed for securing. In this article, we have reviewed the latest communication protocols designed to secure authentication processes and agree on session keys in IoT environments. We analyzed the proposed protocols’ security level, vulnerability, and computational and communication costs. We showed our observations, describing the requirements that a secure protocol should meet.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference140 articles.
1. A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions;Kumar;J. Netw. Comput. Appl.,2022
2. Wearable Sensors Quantify Mobility in People With Lower Limb Amputation During Daily Life;Kim;IEEE Trans. Neural Syst. Rehabil. Eng.,2020
3. Analyzing gait symmetry with automatically synchronized wearable sensors in daily life;Steinmetzer;Microprocess. Microsystems,2020
4. Khan, F., Xu, Z., Sun, J., Khan, F.M., Ahmed, A., and Zhao, Y. (2022). Recent Advances in Sensors for Fire Detection. Sensors, 22.
5. Alsaeed, N., and Nadeem, F. (2022). Authentication in the Internet of Medical Things: Taxonomy, Review, and Open Issues. Appl. Sci., 12.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献