ResearchSpace

Device authentication schemes in IoT: A Review

Show simple item record

dc.contributor.author Lucia, O
dc.contributor.author Isong, B
dc.contributor.author Gasela, N
dc.contributor.author Abu-Mahfouz, Adnan MI
dc.date.accessioned 2020-04-23T09:57:36Z
dc.date.available 2020-04-23T09:57:36Z
dc.date.issued 2019-11
dc.identifier.citation Lucia, O. et al. 2019. Device authentication schemes in IoT: A Review. IEEE International Multidisciplinary Information Technology and Engineering Conference (IMITEC) 2019, Vanderbijlpark, South Africa, 21-22 November 2019 en_US
dc.identifier.isbn 978-1-7281-0040-1
dc.identifier.isbn 978-1-7281-0041-8
dc.identifier.uri https://ieeexplore.ieee.org/document/9015902
dc.identifier.uri DOI: 10.1109/IMITEC45504.2019.9015902
dc.identifier.uri http://hdl.handle.net/10204/11429
dc.description Paper presented at the IEEE International Multidisciplinary Information Technology and Engineering Conference (IMITEC) 2019, Vanderbijlpark, South Africa, 21-22 November 2019 en_US
dc.description.abstract Internet of Things (IoT) is one of the most promising technologies and has wide spread application areas in the information technology for future products and services. Developments in IoT have given rise to device proliferation which in turn increase IoT challenges such as security. One of the security challenges is the authentication of heterogeneous devices in the network. Due to the unique nature of these devices, traditional security schemes proposed and developed over the years have been rendered inept and infeasible for IoT application. However, several lightweight solutions have also been proposed for IoT application, but are far from being efficient. Therefore, this paper performed a review on some of these studies in order to comprehend the challenge, identify some of the approaches offered, and provide recommendations for future research. We reviewed about 9 articles and our analysis shows authentication is still an open issue in IoT and there is no generic approach to authenticate devices. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.relation.ispartofseries Worklist;23179
dc.subject Internet of Things en_US
dc.subject IoT en_US
dc.subject Device authentication schemes en_US
dc.title Device authentication schemes in IoT: A Review en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Lucia, O., Isong, B., Gasela, N., & Abu-Mahfouz, A. M. (2019). Device authentication schemes in IoT: A Review. IEEE. http://hdl.handle.net/10204/11429 en_ZA
dc.identifier.chicagocitation Lucia, O, B Isong, N Gasela, and Adnan MI Abu-Mahfouz. "Device authentication schemes in IoT: A Review." (2019): http://hdl.handle.net/10204/11429 en_ZA
dc.identifier.vancouvercitation Lucia O, Isong B, Gasela N, Abu-Mahfouz AM, Device authentication schemes in IoT: A Review; IEEE; 2019. http://hdl.handle.net/10204/11429 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Lucia, O AU - Isong, B AU - Gasela, N AU - Abu-Mahfouz, Adnan MI AB - Internet of Things (IoT) is one of the most promising technologies and has wide spread application areas in the information technology for future products and services. Developments in IoT have given rise to device proliferation which in turn increase IoT challenges such as security. One of the security challenges is the authentication of heterogeneous devices in the network. Due to the unique nature of these devices, traditional security schemes proposed and developed over the years have been rendered inept and infeasible for IoT application. However, several lightweight solutions have also been proposed for IoT application, but are far from being efficient. Therefore, this paper performed a review on some of these studies in order to comprehend the challenge, identify some of the approaches offered, and provide recommendations for future research. We reviewed about 9 articles and our analysis shows authentication is still an open issue in IoT and there is no generic approach to authenticate devices. DA - 2019-11 DB - ResearchSpace DP - CSIR KW - Internet of Things KW - IoT KW - Device authentication schemes LK - https://researchspace.csir.co.za PY - 2019 SM - 978-1-7281-0040-1 SM - 978-1-7281-0041-8 T1 - Device authentication schemes in IoT: A Review TI - Device authentication schemes in IoT: A Review UR - http://hdl.handle.net/10204/11429 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record