{"title":"A Survey on the Authentication Techniques in Internet of Things","authors":"Shubham Agrawal, Priyanka Ahlawat","doi":"10.1109/SCEECS48394.2020.86","DOIUrl":null,"url":null,"abstract":"The IoT plays a vital role in all aspects of our daily lives. WSN consists of tiny and compact devices, called as sensor nodes, which could be deployed in remote environment to monitor an event. These devices are used to gather data, sense data and process it. A sensor node has the capability to communicate with other sensor nodes through wireless channels. The major concern is the quality of service, which is required for correct data transmission at right time. Due to several attacks, secure transmission is a major concern in WSN application to gather reliable data. These attacks includes traffic analysis, fabrication, disclosure or content and transmission interruption, which are done through node capturing and routing attacks. The main challenge in WSN is to provide strong security along with less overhead to a sensor node. One method of providing security is Authentication. Authentication is the process of confirming that, the information received is correct. The purpose of this chapter is to survey various authentication protocols proposed over different years and analyse them to present a comparative analysis. We shall discuss some of the classification, which includes public-key based, symmetric key based, and dynamic user authentication, lightweight efficient and multi-factor Authentication schemes.","PeriodicalId":167175,"journal":{"name":"2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCEECS48394.2020.86","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The IoT plays a vital role in all aspects of our daily lives. WSN consists of tiny and compact devices, called as sensor nodes, which could be deployed in remote environment to monitor an event. These devices are used to gather data, sense data and process it. A sensor node has the capability to communicate with other sensor nodes through wireless channels. The major concern is the quality of service, which is required for correct data transmission at right time. Due to several attacks, secure transmission is a major concern in WSN application to gather reliable data. These attacks includes traffic analysis, fabrication, disclosure or content and transmission interruption, which are done through node capturing and routing attacks. The main challenge in WSN is to provide strong security along with less overhead to a sensor node. One method of providing security is Authentication. Authentication is the process of confirming that, the information received is correct. The purpose of this chapter is to survey various authentication protocols proposed over different years and analyse them to present a comparative analysis. We shall discuss some of the classification, which includes public-key based, symmetric key based, and dynamic user authentication, lightweight efficient and multi-factor Authentication schemes.