Title: Centralised and distributed authentication scheme in internet of things: review and outlook

Authors: Upendra Verma; Diwakar Bhardwaj

Addresses: Department of Computer Engineering and Applications, GLA University, Mathura-281406, India ' Department of Computer Engineering and Applications, GLA University, Mathura-281406, India

Abstract: Internet of things (IoT) is the promising technology in which devices equipped with processors, actuators and sensors communicate with each other to serve a meaningful objective. Security is the essential requirements and authentication plays a vital role in IoT system. This paper is a comprehensive attempt to provide state of art survey of available centralised and distributed authentication scheme until 2020. The comparison has been carried out in terms of various factors network model, type of architecture, application domain and IoT layers. Based on the finding, it can be observed that 'IoT architecture' and 'how the authentication is performed' criterion can play an important role for deciding the authentication scheme. This paper provides summary of wide range of authentication schemes with the help of showing their strengths and limitations. The paper introduced a conceptualisation process of authentication for IoT, which constitutes a footstep for researchers working under different application domain.

Keywords: conceptualisation process; centralised authentication scheme; distributed authentication scheme; IoT architecture; network model; type of architecture.

DOI: 10.1504/IJITST.2022.121418

International Journal of Internet Technology and Secured Transactions, 2022 Vol.12 No.2, pp.127 - 160

Received: 30 Apr 2020
Accepted: 12 Feb 2021

Published online: 11 Mar 2022 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article