Survey of Authentication Framework for the Physical Objects in WSN of IoT

Authors

  • Chandrakant R. Mankar  Research Scholar, Department of Computer Science, Shri Shivaji College, Akola, Maharashtra, India
  • Dr. Vinod M. Patil  Research Guide, Department of Computer Science, Shri Shivaji College, Akola, Maharashtra, India
  • Gopal P. Gawali  Assistant Professor & Head, Department of Computer Science, R. A. College Washim, Maharashtra, India

Keywords:

Authentication, Authorization, Physical Objects, IoT, WSN, PUF, Block-chain, Encryption, Integrity.

Abstract

In IoT proliferation of the WSN is rapid, to ensure the security of the physical objects many challenges are faced. This paper is a comprehensive survey of frameworks for authentication that are being proposed on different parameters, provides detailed analysis of techniques and protocols required for authentication framework. The survey explores authentication framework components like digital signatures, certificates, different encryption schemes of keys, and offers new researchers designers of systems to understand the different approaches in developing the efficient and robust solution for physical objects authentication framework.

References

  1. C. R. Mankar, Dr. Prof. V. M. Patil, G. P. Gawali, “Review of Attacks on Physical Objects and Their Countermeasures in WSN of IoT Framework”, International Interdisciplinary Virtual Conference on ‘Recent Advancements in Computer Science, Management and Information Technology’, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 9,issue 7, March-April 2023.
  2. M. A. Ferrag, K. A. Maglaras, et al., “Authentication Protocols for Internet of Things: A Comprehensive Survey”, Security and Communication Networks, vol. 2017.
  3. M. Trnka, T. Cerny, and N. Stickney, “Survey of Authentication and Authorization for the Internet of Things”, Security and Communication Networks, vol. 2018.
  4. K. O. Bate, N. Kumar, S. Khatri, “Framework for authentication and access control in IoT”, 2nd International Conference on Telecommunication and Networks (Tel-NET) 2017.
  5. M. El-hajj, A. Fadlallah, M. Chamoun, et. al., “A Survey of Internet of Things (IoT) Authentication Schemes”, Sensors, 2019.
  6. M. Alizadeh, M. H. Tadayon, A. Jolfaei, “Secure ticket-based authentication method for IoT applications”, Digital Communications and Networks, 2021.
  7. T. Nandy, et. al., “Review on Security of Internet of Things Authentication Mechanism”, IEEE Access, vol. 7, 2019.
  8. M. B. M. Noor, W. H. Hassan, “Current research on Internet of Things (IoT) security: A survey”, Computer Networks, 2018.
  9. A. M. Ansari, Dr. M. Husain, “Middleware Based Node Authentication Framework For IoT Networks”, Proceedings of the International Conference on Inventive in Computing Applications (ICIRCA-2018), 2018.
  10. M. Barbareschi, et. al., “PUF-enabled Authentication-as-a-Service in Fog-IoT systems”, IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), 2019.
  11. M. N. Aman, M. H. Basheer, B. Sikdar, “Two-Factor Authentication for IoT Location Information”, IEEE Internet of Things Journal, vol. 6, April 2019.
  12. S. Kavianpour, et. al., “A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices”, Hindawi Journal of Computer Networks and Communication, vol. 2019.
  13. T. Ahsan, et. al., “IoT Devices, User Authentication, and Data Management in a Secure, Validated Manner through Blockchain System”, Hindawi Wireless Communication and Mobile Computing, vol. 2022.
  14. M. N. Aman, K. C. Chua and B. Sikdar, “Mutual Authentication in IoT System using Physical Unclonable Functions”, IEEE Internet of Things Journal, vol. 4, Oct. 2017.
  15. B. Liu, et. al., “SEPSI: A Secure and Efficient Privacy-Preserving Set Intersection with Identity Authentication in IoT”, Mathematics, 2022.
  16. R. S. M. Joshita, L. Arockiam, “Authentication in IoT Environment: A Survey”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 6, Issue 10, 2016.
  17. I. Ali, S. Sabir, Z. Ullah, “Internet of Things Security, Devices Authentication and Access Control: A Review”, International Journal of Computer Science and Information Security (IJCSIS), vol. 14, Aug. 2016.
  18. M. El-Hajj, et. al., “Analysis of authentication techniques in Internet of Things (IoT)”, 1st Cyber Security in Networking Conference (CSNet), 2017.
  19. U. Khalil, et. al., “A Blockchain Footprint for Authentication of IoT-Enabled Smart Devices in Smart Cities: State-of-the-Art Advancement, Challenges and Future Research Directions”, Survey, 2022.
  20. A. H. Sodhro, et.al., “Intelligent authentication of 5G health devices: A survey”, IEEE Internet of Things, vol. 20, 2022.
  21. M. T. Al Ahmed, et. al., “Hierarchical blockchain structure for node authentication in IoT networks”, Egyptian Informatics Journal, vol. 23, Issue 2, 2022.
  22. K. H. Wang, et. al., “A secure authentication scheme for Internet of Things”, Pervasive and Mobile Computing, vol. 42, 2017.
  23. M. Saqib, B. Jasra, A. H. Moon, “A Lightweight three factor authentication framework for IoT based critical applications”, Journal of King Saud University – Computer and Information Sciences, 2021
  24. Li. Chongxuan, H. Zhang, Y. Mao, “A Survey of Attribute-Based Encryption Scheme”, IEEE Access, vol. 8, 2020
  25. M. I. Islam, et. al., “Elliptic Curve Cryptography for Wireless Sensor Networks: A Survey and Comparative analysis”, Sensors, vol. 16, 2016.
  26. F. Rahman, et. al., “A Survey on Identity-Based Cryptography”, Future and Informatics Journal, vol. 6, 2021
  27. S. Lu, X. Cheng, and J. Wang, “Efficient and secure revocable Identity-Based Encryption with Tight Security Reduction”, IEEE Transactions on Dependable and Secure Computing, 2021.

Downloads

Published

2023-06-30

Issue

Section

Research Articles

How to Cite

[1]
Chandrakant R. Mankar, Dr. Vinod M. Patil, Gopal P. Gawali, " Survey of Authentication Framework for the Physical Objects in WSN of IoT" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 3, pp.507-512, May-June-2023.