dc.contributor.author |
Lucia, O
|
|
dc.contributor.author |
Isong, B
|
|
dc.contributor.author |
Gasela, N
|
|
dc.contributor.author |
Abu-Mahfouz, Adnan MI
|
|
dc.date.accessioned |
2020-04-23T09:57:36Z |
|
dc.date.available |
2020-04-23T09:57:36Z |
|
dc.date.issued |
2019-11 |
|
dc.identifier.citation |
Lucia, O. et al. 2019. Device authentication schemes in IoT: A Review. IEEE International Multidisciplinary Information Technology and Engineering Conference (IMITEC) 2019, Vanderbijlpark, South Africa, 21-22 November 2019 |
en_US |
dc.identifier.isbn |
978-1-7281-0040-1 |
|
dc.identifier.isbn |
978-1-7281-0041-8 |
|
dc.identifier.uri |
https://ieeexplore.ieee.org/document/9015902
|
|
dc.identifier.uri |
DOI: 10.1109/IMITEC45504.2019.9015902
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/11429
|
|
dc.description |
Paper presented at the IEEE International Multidisciplinary Information Technology and Engineering Conference (IMITEC) 2019, Vanderbijlpark, South Africa, 21-22 November 2019 |
en_US |
dc.description.abstract |
Internet of Things (IoT) is one of the most promising technologies and has wide spread application areas in the information technology for future products and services. Developments in IoT have given rise to device proliferation which in turn increase IoT challenges such as security. One of the security challenges is the authentication of heterogeneous devices in the network. Due to the unique nature of these devices, traditional security schemes proposed and developed over the years have been rendered inept and infeasible for IoT application. However, several lightweight solutions have also been proposed for IoT application, but are far from being efficient. Therefore, this paper performed a review on some of these studies in order to comprehend the challenge, identify some of the approaches offered, and provide recommendations for future research. We reviewed about 9 articles and our analysis shows authentication is still an open issue in IoT and there is no generic approach to authenticate devices. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.relation.ispartofseries |
Worklist;23179 |
|
dc.subject |
Internet of Things |
en_US |
dc.subject |
IoT |
en_US |
dc.subject |
Device authentication schemes |
en_US |
dc.title |
Device authentication schemes in IoT: A Review |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Lucia, O., Isong, B., Gasela, N., & Abu-Mahfouz, A. M. (2019). Device authentication schemes in IoT: A Review. IEEE. http://hdl.handle.net/10204/11429 |
en_ZA |
dc.identifier.chicagocitation |
Lucia, O, B Isong, N Gasela, and Adnan MI Abu-Mahfouz. "Device authentication schemes in IoT: A Review." (2019): http://hdl.handle.net/10204/11429 |
en_ZA |
dc.identifier.vancouvercitation |
Lucia O, Isong B, Gasela N, Abu-Mahfouz AM, Device authentication schemes in IoT: A Review; IEEE; 2019. http://hdl.handle.net/10204/11429 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Lucia, O
AU - Isong, B
AU - Gasela, N
AU - Abu-Mahfouz, Adnan MI
AB - Internet of Things (IoT) is one of the most promising technologies and has wide spread application areas in the information technology for future products and services. Developments in IoT have given rise to device proliferation which in turn increase IoT challenges such as security. One of the security challenges is the authentication of heterogeneous devices in the network. Due to the unique nature of these devices, traditional security schemes proposed and developed over the years have been rendered inept and infeasible for IoT application. However, several lightweight solutions have also been proposed for IoT application, but are far from being efficient. Therefore, this paper performed a review on some of these studies in order to comprehend the challenge, identify some of the approaches offered, and provide recommendations for future research. We reviewed about 9 articles and our analysis shows authentication is still an open issue in IoT and there is no generic approach to authenticate devices.
DA - 2019-11
DB - ResearchSpace
DP - CSIR
KW - Internet of Things
KW - IoT
KW - Device authentication schemes
LK - https://researchspace.csir.co.za
PY - 2019
SM - 978-1-7281-0040-1
SM - 978-1-7281-0041-8
T1 - Device authentication schemes in IoT: A Review
TI - Device authentication schemes in IoT: A Review
UR - http://hdl.handle.net/10204/11429
ER -
|
en_ZA |