Centralised and distributed authentication scheme in internet of things: review and outlook Online publication date: Fri, 11-Mar-2022
by Upendra Verma; Diwakar Bhardwaj
International Journal of Internet Technology and Secured Transactions (IJITST), Vol. 12, No. 2, 2022
Abstract: Internet of things (IoT) is the promising technology in which devices equipped with processors, actuators and sensors communicate with each other to serve a meaningful objective. Security is the essential requirements and authentication plays a vital role in IoT system. This paper is a comprehensive attempt to provide state of art survey of available centralised and distributed authentication scheme until 2020. The comparison has been carried out in terms of various factors network model, type of architecture, application domain and IoT layers. Based on the finding, it can be observed that 'IoT architecture' and 'how the authentication is performed' criterion can play an important role for deciding the authentication scheme. This paper provides summary of wide range of authentication schemes with the help of showing their strengths and limitations. The paper introduced a conceptualisation process of authentication for IoT, which constitutes a footstep for researchers working under different application domain.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Internet Technology and Secured Transactions (IJITST):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com