| Literature DB >> 30845760 |
Mohammed El-Hajj1,2, Ahmad Fadlallah3, Maroun Chamoun4, Ahmed Serhrouchni5.
Abstract
The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental first step for researchers and developers addressing this domain.Entities:
Keywords: Internet of Things; IoT; authentication; security
Year: 2019 PMID: 30845760 PMCID: PMC6427355 DOI: 10.3390/s19051141
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1IoT architecture models.
IoT Architecture and security requirements.
| Layer | Security Requirements |
|---|---|
|
| Lightweight Encryption |
| Authentication | |
| Key Agreement | |
| Data Confidentiality | |
|
| Communication Security |
| Routing Security | |
| Authentication | |
| Key Management | |
| Intrusion Detection | |
|
| Authentication |
| Privacy protection | |
| Information Security Management |
Figure 2Taxonomy of IoT authentication schemes.
Analysis of IoT Authentication Schemes.
| Ref# | IoT Layer | Identity Context Credentials | Token Based? | Proc. | Arch. | HW. | Strength(+)/Weakness(−) |
|---|---|---|---|---|---|---|---|
| [ | A | Encryption | x | 2 | C/H | I | +Encapsulation is used to efficiently benefit from resources. |
| [ | A + N | Encryption/RSA | x/DTLS | 2 | C/H | I | +Low overhead regarding computation and communication and high interoperability |
| [ | P | Encryption/Symmetric asynchronous One Time Password (OTP) | x/TLS | 2 | C/H | I | +Resistance to some DoS and replay attacks. |
| [ | N | Encryption/Symmetric | ✓(NodeID, Indices of space, and Seed) | 3 | D/H | I | +Resistance to node capture attack |
| [ | N | Encryption/Symmetric | ✓(polynomialID) | 3 | D/H | I | +Resistance to node capture attack |
| [ | A + N | Encryption/Asymmetric | ✓(Information) | 2 | D/H | I | +Resistance to Malicious entity by using PKI |
| [ | A + N | Encryption/Asymmetric | ✓(FormId) | 2 | C/H | I | +Compatibility problems are solved |
| [ | A + N + P | Encryption/Symmetric | ✓(IP/EPC) | 2 | C/F | I | +Resilience to attacks, access control, client privacy and data confidentiality |
| [ | N + P | Encryption/Symmetric using XOR | ✓(SpecificId) | 2 | C/F | I | +Authentication of RFID tags with readers |
| [ | N + P | Encryption/Symmetric + Hash + Credit card as context | ✓(Nonce) | 2 | C/H | E | +Resistance to Man-in-the-Middle, Impersonation, Replay, Privileged insider attacks, Stolen smart card, Smart card breach attacks, etc. |
| [ | N + P | Encryption/Asymmetric using ECC | ✓(Identity, Elliptic curve function, and parameters) | 2 | C/H | I | +Resistance to Eavesdropping, DoS, Node capture, Replay and MITM attack |
| [ | A + N + P | Encryption/Asymmetric using RSA and ECC | x/DTLS | 2 | C/F | I | +Performance measurement is considered. |
| [ | A + N + P | Encryption/Asymmetric using ECC | ✓(Identity) | 2 | D/F | I | +Resistance to malicious users and DoS attacks. |
| [ | A | N/A | ✓(OAuth2.0) | 1 | C/H | I | +Resistance to Impersonation and Replay attacks |
| [ | A | Encryption: registered user with AES and non-registered users using Diffie–Hellman | x (username + password) | 1 | C/F | I | +Two separate servers for storing cryptography and authentication data, |
| [ | P | Encryption/Symmetric using AES | ✓ | 2 | C/H | I | +Resistance to split attacks (i.e., swapping tags, separating tag from product, etc.) |
| [ | A | No Encryption/Hash | ✓ | 1 | D/F | I | +Resistance to MITM, replay, DoS, and Eavesdropping attacks. |
| [ | A | Context/multiple credentials using physical context | x (User name + password) | Multiple authentication | D/H | I | +Resistance to replay attack |
| [ | A | No Encryption/Hash 256 bits + context bio-metric | ✓(User Identity) | 2 | D/F | E | +Second-tier authentication is done at client side. |
| [ | A | Encryption/Asymmetric using ECC | ✓(UserId) | 2 | D/F | I | +Resistance to MITM and DoS attacks. |
| [ | A | Encryption/RSA + Hash SHA or MD5 | x | 2 | C/H | I | +Filtering of the messages at gateway |
| [ | A + N | Encryption/RSA + AES | x | 2 | D/F | I | +Resistance to Modification, Replay, and Message analysis attacks |
| [ | A + N | Encryption/Symmetric + Hashing | ✓ + x | 2 | C/F | I | +Resistance to Replay, Impersonation, Spoofing, and Gateway attacks. |
| [ | A + N + P | Encryption/Symmetric | ✓(Identity) | 2 | C/F | I | +Resistance to MITM and DoS attack |
| [ | A + N + P | Encryption/Asymmetric using ECC | ✓(Identity) | 3 | C/F | I | +Resistance to redirection, malicious, Dos, and MITM attacks. |
| [ | N + P | Encryption/Asymmetric | ✓(Identity) | 2 | C/F | I | +Location privacy is analyzed |
| [ | N + P | Encryption/Asymmetric using ECC + Hashing | ✓(Identity) | 2 | C/F | I | +Group of end devices is authenticated at the same time |
| [ | N + P | N/A | ✓(audio samples as an identity) | 2 | D/H | I | +Low error rate and resistance to audio replay, changing distance, and same type device attacks. |
| [ | N + P | Encryption/Symmetric + Hashing + Asymmetric using ECC | ✓(Elliptic curve function) | 2 | C/F | I | +Privacy preservation is considered |
| [ | A + N + P | Encryption/Symmetric(AES) + Hashing | ✓(user Identity) | 2 | C/F | I | +Resistance to guessing, impersonation, and replay attacks |
| [ | N + P | Encryption/Symmetric + Asymmetric using Hybrid Linear Combination Encryption (HLCE) | ✓(user Identity) | 2 | C/F | I | +Resistance to DoS and impersonation, considers data integrity and ensures user privacy |
| [ | P | N/A | ✓(writing process) | 2 | C/H | I | +Improve security without adding any extra hardware |
| [ | A + N + P | Encryption/Symmetric | ✓(user Identity) | 2 | D/H | I | +Less location update.+Uses asymmetric links in VANET. |
| [ | N + P | Encryption/Symmetric + Asymmetric + Hashing | x | 3 | D/H | I | +Computation cost is efficient. |
| [ | N + P | Encryption/Symmetric+ Hashing | x | 2 | C/F | I | +Resistance to DoS attacks and to packet loss |
| [ | N + P | Encryption/Symmetric+ Hashing | x | 2 | C/F | I | +Resistance to DoS attacks and to packet loss |
| [ | N + P | Encryption/Asymmetric using ECC | ✓(cover image) | 2 | C/H | I | +Error rate is considered and analyzed |
| [ | N + P | Encryption/Symmetric + Asymmetric + Hashing | ✓(Spanish eID cards) | 2 | C/H | E | +Resistance to replay, DDoS attacks and improve confidentiality and non-repudiation. |
| [ | N + P | Encryption/Symmetric(AES) + Asymmetric (DH) + Hashing | ✓(transaction ID) | 2 | C/H | I | +No rely on third parties for shared key management, instead a DH based key exchange mechanism is used. |
| [ | N + P | Encryption/Symmetric + Asymmetric + Hashing | ✓(pseudo-identity (PsID)) | 2 | C/H | I | +Provides a node, message authentication, and privacy protection. |
| [ | N + P | Encryption/Symmetric(AES) + Asymmetric(ECDSA) + Hashing | ✓(pseudo-identity (PsID)) | 2 | C/F | I | +Security and privacy analysis is considered |
| [ | N + P | Encryption/Asymmetric + Hashing | ✓(pseudo-identity (PsID)) | 2 | C/F | I | +Resistance to DoS, Replay, Sybil, and False message attacks. |
| [ | N + P | Encryption/symmetric + Hashing | ✓(identity) | 2 | C/H | I | +Resistance to Movement tracking, Replay, and Message modification attacks. |
| [ | N + P | Encryption/Symmetric + Asymmetric + Hashing | No/TLS | 2 | C/F | I | +Resistance to Impersonation and MITM attacks. |
| [ | N + P | Encryption/Symmetric + Asymmetric + Hashing | x | 2 | C/F | I | +Resistance to Substitution attack (a kind of MITM attack). |
| [ | A + N + P | Encryption/Asymmetric + Hashing | x | 2 | C/F | I | +Efficient use of one-way hash |
| [ | N + P | Encryption/Asymmetric + Hashing | x | 2 | C/F | I | −Increase the computation overhead although it is balanced between sender and receiver |
| [ | N + P | Encryption/Symmetric + Asymmetric + Hashing | x | 2 | C/F | I | +Resistance to Message modification attacks, Replay, Message analysis, and message injection attacks. |
| [ | N + P | Encryption/Asymmetric + Hashing | x | 2 | C/F | I | +Computation and communication cost is efficient |
| [ | N + P | Encryption/Asymmetric + Hashing | ✓(Node ID) | 3 | C/F | I | +Resistance to DoS, MITM, Brute force and Replay attacks |
| [ | N + P | Encryption/Asymmetric + Hashing | ✓(Identity) | 2 | C/F | I | +Efficient with respect to the success rate+Identity privacy is considered+Message overhead is low |
| [ | N + P | Encryption/symmetric + Asymmetric + Hashing | x | 2 | C/F | I | +Resistance to Replay, collision, and chosen-plain-text attacks. |
| [ | N + P | Encryption/Asymmetric + Hashing | ✓(Entity Id and Serial number) | 2 | C/F | I | +Resistance to Impersonation, Brute force, DoS, MITM, and Replay attacks |
| [ | N + P | Encryption/Asymmetric(chaotic map) + Hashing | ✓(Identity id and password) | 2 | C/H | I | +User is anonymous |
| [ | A + N + P | Encryption/symmetric + Asymmetric + Hashing | ✓(Identity) | 2 | D/H | I | +Resistance to Password guessing, Impersonation, Forgery, and Known session-key attacks |
| [ | A + N + P | Encryption/symmetric + Hashing | ✓(Identity id and password) | 2 | C/F | E | +Resistance to Stolen-Verifier, Password guessing, and Impersonation attacks |
| [ | A + N + P | Encryption/symmetric + Hashing | ✓((smart card and password) | 2 | C/F | E | +Resistance to Replay, Masquerading user, Masquerading gateway, Gateway secret guessing, Password guessing, and Stolen-Verifier attacks |
| [ | A + N + P | Encryption/symmetric + Hashing | ✓(Identity Id) | 2 | C/F | I | +Resistance to node capture and key compromise impersonation attack. |
| [ | P | N/A | x | 2 | C/F | I | +Provided a discussion of machine learning attacks and how to deal with it. |
| [ | P | Encryption/Asymmetric(RSA or ECC) + Hashing | x | 2 | C/F | I | +Resistance to MITM and compromising a device attacks. |
| [ | P | Encryption/symmetric + Asymmetric + Hashing | x | 2 | C/F | I | +Resistance to machine-learning attacks |
| [ | P | Hashing | ✓(User password) | 2 | C/F | I | +Resistance to device cloning or copying |
| [ | P | Encryption/symmetric + Hashing | ✓(One-time alias, identity and nonce) | 2 | C/F | I | +Computation cost is low |
| [ | P | Encryption/symmetric + Hashing | x | 2 | C/F | I | +Protect against physical and side channel attacks |
| [ | P | Encryption/symmetric + Asymmetric + Hashing | ✓(Dynamic Identity) | 2 | C/H | I | +Protect against Impersonation, Physical, and Reply attacks. |
| [ | P | Encryption/symmetric + Asymmetric + Hashing | ✓(Identity) | 2 | C/F | E | +Resistance to physical cloning attack. |
| [ | P | Encryption/symmetric + Hashing | ✓(Identity) | 2 | C/H | I | +Deal with environmental variations(noisy system) |
| [ | P | Encryption/symmetric + Hashing | ✓(nonce) | 2 | C/F | I | +Resistance to cloning, replay, back-tracking, and clone attacks. |
| [ | A + N + P | Encryption/symmetric + Asymmetric + Hashing | ✓(Identity) | 2 | C/F | E | +Resistance to DoS |
| [ | P | Encryption/symmetric + Asymmetric + Hashing | ✓(Identity + smart card + password) | 2 | C/H | E | +Compared with RSA regarding the encryption and decryption time |
| [ | P | Encryption/symmetric + Hashing | ✓(smart device ID) | 2 | C/H | I | +Efficient in terms of computation and communication |
| [ | A + N + P | Encryption/Asymmetric + symmetric + Hashing | ✓(smart card + ID) | 2 | C/H | E | +Computation and communication |
| [ | A + N + P | Biometric | ✓(physical properties) | 1 | C/H | E | +Ease to be used in smart health environments+No ability to be stolen, borrowed, and forgotten. |
| [ | A + N + P | Encryption/+ symmetric + Hashing + Biometric | ✓(physical properties, smart card, ID and password) | 2 | C/H | E | +Uses three-factor authentication and privacy preserving is considered. |
| [ | P | Encryption/Asymmetric | ✓(Nonce) | 2 | C/H | I | +Uses two-factor authentication and |
| [ | P | Encryption/+symmetric | ✓(physical properties) | 2 | C/H | I | +New architecture using PUF |
| [ | A + N + P | Encryption/+Assymmetric + Hashing | ✓(ID, token) | 2 | C/H | I | +New architecture of using Blockchain in IoT. |
| [ | A + N + P | Encryption/+symmetric | ✓(ID, token) | 2 | C/H | I | +Resistance to replay, DoS, eavesdropping, and resource exhaustion attacks. |
| [ | A + N + P | Encryption/+ Assymmetric + symmetric + Hashing | ✓(ID) | 2 | D/H | I | +Use of Azure IoT hub cloud infrastructure. |
| [ | A + N + P | Encryption/+ symmetric + Hashing | ✓(ID, pseudo-identity pair) | 2 | D/H | I | +Computation cost is low at the device side. |
| [ | P | physical fingerprint as context | ✓(ID) | 1 | C/F | E | +Two-factors are used for authentication |
| [ | P | Behavior as context | ✓(ID) | 1 | C/H | I | +Modeling subset of the data to test the results |
| [ | P | Hashing + Xor | ✓(ID) | 2 | C/H | I | +Novel scheme and benefiting from cache concept. |
| [ | P | Shifting + Xor | ✓(ID, pseudonym (IDS)) | 2 | C/H | I | +Novel scheme and benefiting from cache concept. |