| Literature DB >> 35214259 |
Michal Trnka1, Amr S Abdelfattah2, Aishwarya Shrestha3, Michael Coffey2, Tomas Cerny2.
Abstract
Technologies for the Internet of Things (IoT) are maturing, yet no common standards dictate their direction, leaving space for a plethora of research directions and opportunities. Among the most important IoT topics is security. When we design a robust system, it is important to know the available options for facing common tasks related to access control, authentication, and authorization. In this review, we systematically analyze 1622 peer-reviewed publications from October 2017 to December 2020 to find the taxonomy of security solutions. In addition, we assess and categorize current practices related to IoT security solutions, commonly involved technologies, and standards applied in recent research. This manuscript provides a practical road map to recent research, guiding the reader and providing an overview of recent research efforts.Entities:
Keywords: Internet of Things; authentication; authorization; identity management; security; survey
Mesh:
Year: 2022 PMID: 35214259 PMCID: PMC8963074 DOI: 10.3390/s22041361
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Overview of related work.
| Publication | Published | Summary |
|---|---|---|
| Noor et al. [ | 2019 | A comprehensive overview of authentication and authorization research for years between 2016 and 2018. |
| Trnka et al. [ | 2018 | Mapping study for authentication and authorization articles from 2012 to 2017. |
| Chanal et al. [ | 2020 | Survey providing an overview of architectures, privacy and research challenges, and differences of solutions between domains. |
| Milovlaskaya et al. [ | 2019 | Great overview of IoT back-end security issues, general hardware, and application security, along with a summary of IoT security management and security standards. |
| Al-Naji et al. [ | 2020 | Focused survey on continuous authentication methods. |
| Tange et al. [ | 2020 | Focused survey on industrial IoT security issues. |
Queries used for the search.
| Indexer | Query |
|---|---|
| General query | (“Internet of Things” OR “IoT”) AND “Security” AND (“Authentication” OR “Authorization” OR “Identity” OR “Access control”) AND NOT (“Network” OR “Hardware” OR “RFID” OR “Protocol” OR “Cryptography” OR “Survey” OR “Study”) |
| IEEE Xplore | ((“Abstract”: “Internet of Things” OR “Abstract”: “IoT”) AND (“Abstract”: “Authentication” OR “Abstract”: “Authorization” OR documentAbstract: “Identity” OR “Abstract”: “Access Control”) AND “Index Terms”: “Security” AND NOT(“Index Terms”: “Network” OR documentAbstract: “Hardware” OR “Abstract”: “Cryptography” OR “Abstract”: “Protocol” OR “Document Title”: “Survey” OR “Abstract”: “RFID” OR “Document Title”: "Study")) |
| ACM DL | Abstract: (IoT “Internet of Things”) AND Abstract: (“Authentication” OR “Authorization” OR “Identity” OR “Access Control”) AND Title: (-study -Survey) AND Abstract: (-Hardware -rfid -Cryptography) AND Keyword: (-Hardware -Physical -Network) |
| WoS SCIE | TI = (Internet of Things OR IoT) AND TS = (Authentication OR Authorization OR Identity OR Access Control) NOT TS = (Hardware OR Cryptography OR Protocol OR RFID OR Physical OR Network) NOT TS = (Survey OR Study) AND TS = Security |
| SpringerLink | ‘(Authentication OR Authorization OR Identity OR “Access Control”) + title (“Internet of Things” OR IoT)’ |
| ScienceDirect | (“Internet of Things” OR “IoT”) AND (“Authentication” OR “Authorization” OR “Identity” OR “Access control”) AND NOT (“Hardware” OR “Cryptography”) |
Number of articles processed in the survey.
| Indexer | Results | Prefiltered | Relevant |
|---|---|---|---|
| IEEE Xplore | 442 | 90 | 76 |
| ACM DL | 150 | 43 | 28 |
| WoS | 133 | 56 | 16 |
| SpringerLink | 491 | 6 | 2 |
| ScienceDirect | 406 | 19 | 10 |
| Total | 1622 | 214 | 132 |
Figure 1Illustration of the survey process-flow inclusion and exclusion of articles.
Figure 2Number of publications per year.
Selected paper categorization part 1/2.
| References | Context Aware? | Topology (Centr./Distr.) | Communication Model | Existing vs. New | Domains | Constrained/ Unconstrained Devices | Required Special or External Devices |
|---|---|---|---|---|---|---|---|
| Ibrahim et al. [ | N | C | U2M | Extension | Smart Home | C | Biometric |
| Baruah et al. [ | N | D | Both | Extension | Industrial IoT Devices | C | Sensor, Router |
| Zulkipli et al. [ | N | D | M2M | New | General | N/A | - |
| Chen et al. [ | N | N/A | U2M | Extension | General | C | Biometrics ECG |
| Kashmar et al. [ | Y | N/A | N/A | Existing | General | N/A | - |
| Karimibiuki et al. [ | Y | D | Both | Existing | General | U | - |
| Chen et al. [ | N | Both | Both | Extension | General | U | - |
| Olazabal et al. [ | Y | C | U2M | Extension | Biometrics | U | - |
| Terkawi et al. [ | N | N/A | N/A | Extension | General | N/A | - |
| Hoang et al. [ | Y | C | U2M | Existing | General | N/A | - |
| Cattermole et al. [ | Y | D | M2M | Existing | General | N/A | - |
| Mathew et al. [ | Y | C | U2M | Existing | Home security | C | Biometrics |
| Jain et al. [ | Y | C | Both | Existing | Automated Attendance System | U | Camera |
| Guo et al. [ | Y | D | U2M | Extension | Fog Computing authentication | C | - |
| Renuka et al. [ | N | N/A | M2M | Extension | IoT Environment | N/A | - |
| Kim et al. [ | Y | C | U2M | Existing | General | U | - |
| Felde et al. [ | N | D | M2M | Extension | Dynamic groups | U | - |
| Mahbub et al. [ | N | Both | M2M | Existing | General | C | RFID |
| Heydari et al. [ | N | N/A | U2M | Extension | Fog Computing | N/A | - |
| Ning et al. [ | N | D | Both | Existing | General | U | - |
| Leung et al. [ | N | D | U2M | New | General | C | Smart Watch |
| Bilgen et al. [ | Y | C | U2M | Existing | General | U | - |
| Oh et al. [ | N | C | Both | New | IoT Platforms | U | - |
| Dammak et al. [ | N | N/A | Both | Extension | General | C | - |
| Nespoli et al. [ | Y | D | U2M | Existing | IoT Environments | U | - |
| Rothe et al. [ | Y | N/A | N/A | New | General | N/A | - |
| Ouaddaha et al. [ | N | D | N/A | New | General | N/A | - |
| Yan et al. [ | N | C | Both | Extension | Home security | C | Smart device (Door Lock), Smartphone |
| Chiu et al. [ | N | C | U2M | Existing | Wearable Devices | C | Wearable brainwave headsets |
| Phoka et al. [ | N | D | U2M | Existing | Security door | C | IR Sensor |
| Heydaria et al. [ | N | N/A | N/A | New | General | N/A | - |
| Malarvizhi et al. [ | N | C | U2M | Extension | Multi-bio authentication | C | Biometric scanners |
| Sharif et al. [ | N | C | M2M | Existing | Road Construction | N/A | - |
| Ashibani et al. [ | Y | D | U2M | Extension | Smart Home | C | Sensor |
| Ulz et al. [ | N | N/A | Both | Existing | General | U | - |
| Gebrie et al. [ | Y | C | U2M | New | Healthcare and Smart Home | C | Biometrics |
| Wang et al. [ | N | D | Both | Extension | General | U | - |
| Nespoli et al. [ | Y | C | U2M | Extension | IoT Platforms | C | Security devices, Sensor |
| Ghosh et al. [ | Y | C | Both | Existing | Home IoT platform or Web service | C | Security devices |
| Gad et al. [ | N | N/A | U2M | Existing | General | C | - |
| Mbarek et al. [ | N | C | U2M | Existing | Smart Home | C | - |
| Hasan et al. [ | Y | D | Both | Extension | General | C | Maxim DS2411 |
| Arfaoui et al. [ | Y | C | Both | Extension | General | U | - |
| Murphy et al. [ | N | D | M2M | Extension | General | C | Accelerometers |
| Durand et al. [ | N | D | M2M | Existing | General | N/A | - |
| Pallavi et al. [ | N | D | Both | Extension | Fog computing | C | Sensor |
| Saadeh et al. [ | N | N/A | N/A | Existing | General | N/A | - |
| Carnley et al. [ | N | D | N/A | Extension | Smartphone Devices | U | - |
| Chifora et al. [ | Y | C | U2M | Extension | Smart Home | U | - |
| Batool et al. [ | Y | C | U2M | Existing | Healthcare | C | Electrocardiogram (ECG) |
| Gamundani et al. [ | N | N/A | N/A | New | Smart Home | N/A | - |
| Chauhan et al. [ | N | D | U2M | Existing | General | C | Smartphone, Smartwatch, Raspberry Pi |
| Dabbagh et al. [ | Y | D | Both | Existing | All Wireless devices | U | Biometrics |
| Ali et al. [ | N | D | U2M | Extension | Healthcare | U | - |
| Wallis et al. [ | Y | C | M2M | New | General | U | - |
| Krašovec et al. [ | Y | Both | M2M | Existing | General | C | Sensors |
| Yang et al. [ | N | C | Both | Existing | Healthcare | C | Sensor |
| Sahoo et al. [ | N | C | U2M | Extension | General | U | - |
| Zhu et al. [ | N | D | N/A | Existing | Smart Home | C | - |
| Das et al. [ | N | C | U2M | Extension | Industrial Internet of Things | C | Biometric sensor |
| R. Khan [ | N | C | Both | Existing | General | U | - |
| Chien [ | Y | D | Both | Existing | General | U | - |
| Aski et al. [ | Y | D | U2M | Existing | Healthcare | U | Raspberry pi |
| Alkhresheh et al. [ | Y | N/A | Both | Extension | IoT Platforms | C | Raspberry Pi |
| Ethelbert et al. [ | Y | C | U2M | Extension | Cloud SaaS Applications | U | - |
| Sun et al. [ | Y | C | U2M | Existing | Wearable Devices | C | Accelerometer |
Selected paper categorization part 2/2.
| References | Context Aware? | Topology (Centr./Distr.) | Communication Model | Existing vs. New | Domains | Constrained/ Unconstrained Devices | Required Special or External Devices |
|---|---|---|---|---|---|---|---|
| Shayan et al. [ | Y | C | U2M | Extension | Smart Home | C | Smart phone, Biometrics |
| Elganzoury et al. [ | N | N/A | U2M | Existing | Mobile banking | U | - |
| Oh et al. [ | N | D | M2M | Extension | General | C | - |
| Zhou et al. [ | N | N/A | U2M | Extension | General | U | Brainwave Sensor |
| Oh et al. [ | N | D | Both | Extension | IoT platforms | C | Sensor |
| Belk et al. [ | N | C | U2M | Existing | General | U | - |
| Hassan et al. [ | N | D | U2M | Extension | Wearable Devices | C | Smart phone |
| Kaliya et al. [ | N | N/A | N/A | Existing | General | U | - |
| Wazid et al. [ | N | D | U2M | Extension | Medicine validity detection | C | - |
| Shah et al. [ | Y | N/A | N/A | New | General | N/A | - |
| Amoon et al. [ | Y | D | M2M | Extension | Any access-control | U | - |
| Yazdanpanah et al. [ | N | C | M2M | Extension | Wireless Sensor Networks | C | Sensor |
| Barbareschi et al. [ | N | D | M2M | Extension | Computing Fog | C | - |
| Loske et al. [ | Y | N/A | N/A | New | General | N/A | - |
| Shahzad et al. [ | Y | C | Both | Extension | General | U | - |
| Rattanalerdnusorn et al. [ | Y | D | U2M | Existing | IoT Environments | U | - |
| Prathibha et al. [ | N | C | U2M | New | Smart Home | U | Biometrics |
| Whaiduzzaman et al. [ | N | C | U2M | Existing | Fog IoT Environment | U | - |
| Liu et al. [ | Y | C | M2M | Existing | Smartphone-centric | C | Smartphone |
| El Kalam et al. [ | N | D | M2M | Existing | General | N/A | - |
| Genç et al. [ | Y | D | Both | Extension | Smart device | U | - |
| Ashibani et al. [ | Y | D | U2M | Existing | Smart Home | U | - |
| Bhatt et al. [ | N | Both | M2M | Existing | General | N/A | - |
| Pal et al. [ | Y | D | U2M | Existing | Healthcare (only Smartphone Device) | C | - |
| Miettinen et al. [ | Y | C | M2M | Existing | General | N/A | - |
| Lu et al. [ | Y | C | U2M | Existing | General | C | Biometrics |
| Gupta et al. [ | Y | C | M2M | Existing | Cars, Vehicles | C | Cars Location Tools |
| Salama et al. [ | Y | D | U2M | Existing | Healthcare | C | - |
| Blue et al. [ | Y | D | U2M | Existing | General | C | Microphones |
| Islam et al. [ | N | D | U2M | Extension | Healthcare | U | - |
| Srinivas et al. [ | Y | N/A | U2M | Existing | Industrial Internet of Things | C | Smartcard, Biometrics |
| Pal et al. [ | Y | D | Both | Extension | General | U | - |
| Atlamab et al. [ | N | C | M2M | New | General | U | - |
| Khalil et al. [ | N | D | M2M | Extension | IoT Environments | U | - |
| Djilali et al. [ | Y | C | Both | Extension | IoT Platforms | U | - |
| Van hamme et al. [ | Y | C | U2M | Existing | General | N/A | - |
| Schuster et al. [ | Y | D | M2M | Existing | General | N/A | - |
| Alianea et al. [ | Y | D | M2M | Extension | Any access-control | U | - |
| Nakouri et al. [ | N | D | M2M | Extension | Video Surveillance Systems | U | Camera, Fingerprint sensor |
| Ranaweera et al. [ | N | D | Both | Existing | Multi-access Edge Computing platform | N/A | - |
| Selvarani et al. [ | N | N/A | N/A | Extension | General | N/A | - |
| Aski et al. [ | N | D | U2M | Existing | Healthcare | U | Biometrics |
| Ahmed et al. [ | N | N/A | U2M | Extension | General | U | - |
| Lupascu et al. [ | Y | D | M2M | Existing | Industrial IoT Devices | C | IoT device/Sensor |
| Krishnan et al. [ | Y | D | Both | Existing | Controlled IoT device | C | Blockchain, Sensor |
| Jonnada et al. [ | N | C | U2M | Extension | Remote Collaboration Systems | U | - |
| Gebresilassie et al. [ | N | D | N/A | Existing | General | N/A | - |
| Martinez et al. [ | Y | D | Both | Extension | Smart city | C | Smartphone, Smart meter |
| Colombo et al. [ | Y | C | M2M | Existing | General | N/A | - |
| Rech et al. [ | N | Both | U2M | Existing | Cross-Domain Service | C | Bluetooth |
| Lee et al. [ | N | C | M2M | New | General | N/A | - |
| S. Hazra [ | N | N/A | U2M | Extension | ATM service | C | Biometrics |
| Tandon et al. [ | Y | D | M2M | Existing | General | U | - |
| Shieng et al. [ | N | C | M2M | Extension | Smart Home | C | - |
| Xiong et al. [ | N | D | Both | Extension | IoT Cloud Storage | U | - |
| Wu et al. [ | N | C | U2M | Extension | Distributed Cloud Computing | U | - |
| Han et al. [ | Y | C | U2M | Existing | General | U | - |
| Fremantle et al. [ | N | C | Both | Extension | IoT Platforms | U | - |
| Daoud et al. [ | N | D | U2M | Existing | Healthcare cloud environment | C | Sensor, ECG |
| Cui et al. [ | N | D | U2M | Extension | General | U | - |
| Vorakulpipat et al. [ | Y | C | U2M | Existing | Card reader, finger print reader | C | Cards |
| Li [ | N | Both | M2M | Existing | General | U | - |
| Gur et al. [ | Y | D | U2M | Existing | IoT Platforms | C | IHG |
| Gong et al. [ | N | N/A | M2M | Existing | Smart city | C | Sensor |
| Gwak et al. [ | N | D | U2M | Existing | General | U | - |
| Chen [ | Y | D | Both | Extension | Security | C | Sensors |
Figure 3Number of articles in each category.