Title: An overview of continuous device-to-device authentication techniques for the internet of things

Authors: Arwa Badhib; Asma Cherif; Suhair Alshehri

Addresses: Department of Information Technology, King Abdulaziz University, Jeddah 22338, Saudi Arabia ' Department of Information Technology, King Abdulaziz University, Jeddah 22338, Saudi Arabia ' Department of Information Technology, King Abdulaziz University, Jeddah 22338, Saudi Arabia

Abstract: Internet of things (IoT) has become an integral part of our daily life. However, this technology exposes many security concerns. With the increasing focus on security and privacy, IoT device authentication becomes a crucial requirement to protect devices against any unauthorised access. Although static authentication ensures the legitimacy of the user or device at the beginning of each session, it does not account for session hijacking that could occur after the initial authentication. Continuous authentication is a more robust authentication technique to ensure security throughout the session. Also, it ensures fast authentication for frequent messages sent during the session. In this research, we analyse the security threats in the context of device-to-device communication. We elaborate on the main authentication requirements for IoT. Additionally, we survey major contributions in authentication and compare them based on the predefined requirements. We believe that the findings of this paper provide valuable information to researchers by presenting new directions for future research.

Keywords: continuous authentication; internet of things; IoT; security; device-to-device; D2D; privacy.

DOI: 10.1504/IJAHUC.2021.114103

International Journal of Ad Hoc and Ubiquitous Computing, 2021 Vol.36 No.4, pp.189 - 206

Received: 04 Mar 2020
Accepted: 31 Oct 2020

Published online: 08 Apr 2021 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article