{"title":"A Survey On IoT Authentication Security Service","authors":"","doi":"10.4018/ijsssp.295101","DOIUrl":null,"url":null,"abstract":"Internet of things is becoming the most important technology now a days and it is next era of communication. By the use of IOT, various physical things can create, send and receive the data seamlessly. Different IoT applications' main focus is to automate the maximum tasks so with minimum human intervention efficiency and productivity can be increased. \"Things\" are directly connected with the Open Web, so any intruder can easily become the part of the network and can launch different attacks. So, to increase the level of comfort and efficiency, high security policy in terms of the authentication is required. Existing authentication methods can not be deployed on \"Things\" as they require high amount of resources and because of that life span of the network will be decreased. In this paper, we have discussed different security threats present at each IoT layer, existing research done in this domain, research gap in existing identity validation methods and also we have find out the future work directions to enhance IoT Security in terms of accurate validation of device identity.","PeriodicalId":264067,"journal":{"name":"International Journal of Systems and Software Security and Protection","volume":"1996 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Systems and Software Security and Protection","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/ijsssp.295101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Internet of things is becoming the most important technology now a days and it is next era of communication. By the use of IOT, various physical things can create, send and receive the data seamlessly. Different IoT applications' main focus is to automate the maximum tasks so with minimum human intervention efficiency and productivity can be increased. "Things" are directly connected with the Open Web, so any intruder can easily become the part of the network and can launch different attacks. So, to increase the level of comfort and efficiency, high security policy in terms of the authentication is required. Existing authentication methods can not be deployed on "Things" as they require high amount of resources and because of that life span of the network will be decreased. In this paper, we have discussed different security threats present at each IoT layer, existing research done in this domain, research gap in existing identity validation methods and also we have find out the future work directions to enhance IoT Security in terms of accurate validation of device identity.