Next Article in Journal
A Vision Based Detection Method for Narrow Butt Joints and a Robotic Seam Tracking System
Next Article in Special Issue
UHF RFID Prototyping Platform for ISO 29167 Decryption Based on an SDR
Previous Article in Journal
Ensemble Dictionary Learning for Single Image Deblurring via Low-Rank Regularization

A Survey of Internet of Things (IoT) Authentication Schemes †

University of Sciences and Arts in Lebanon, Beirut 1002, Lebanon
Saint Joseph University, Beirut 1514, Lebanon
Telecom ParisTech, 75013 Paris, France
Authors to whom correspondence should be addressed.
This paper is an extended version of two papers previously published by the authors in 2017. The first one is: In Proceedings of the 2017 1st Cyber Security in Networking Conference (CSNet), Rio de Janeiro, Brazil, 18–20 October 2017; pp. 1–3 and the second one is: In Proceedings of the 2017 IEEE 15th Student Conference on Research and Development (SCOReD), Putrajaya, Malaysia, 13–14 December 2017; pp. 67–71. (check the references section).
Sensors 2019, 19(5), 1141;
Received: 23 January 2019 / Revised: 22 February 2019 / Accepted: 27 February 2019 / Published: 6 March 2019
(This article belongs to the Special Issue RFID and NFC in Secure IoT Scenarios and Applications)
The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental first step for researchers and developers addressing this domain. View Full-Text
Keywords: Internet of Things; IoT; security; authentication Internet of Things; IoT; security; authentication
Show Figures

Figure 1

MDPI and ACS Style

El-hajj, M.; Fadlallah, A.; Chamoun, M.; Serhrouchni, A. A Survey of Internet of Things (IoT) Authentication Schemes. Sensors 2019, 19, 1141.

AMA Style

El-hajj M, Fadlallah A, Chamoun M, Serhrouchni A. A Survey of Internet of Things (IoT) Authentication Schemes. Sensors. 2019; 19(5):1141.

Chicago/Turabian Style

El-hajj, Mohammed, Ahmad Fadlallah, Maroun Chamoun, and Ahmed Serhrouchni. 2019. "A Survey of Internet of Things (IoT) Authentication Schemes" Sensors 19, no. 5: 1141.

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

Back to TopTop