Amar N. Alsheavi;Ammar Hawbani;Xingfu Wang;Wajdy Othman;Liang Zhao;Zhi Liu;Saeed Hamood Alsamhi;Mohammed A. A. Al-Qaness
{"title":"IoT Authentication Protocols: Classification, Trend and Opportunities","authors":"Amar N. Alsheavi;Ammar Hawbani;Xingfu Wang;Wajdy Othman;Liang Zhao;Zhi Liu;Saeed Hamood Alsamhi;Mohammed A. A. Al-Qaness","doi":"10.1109/TSUSC.2024.3492152","DOIUrl":null,"url":null,"abstract":"This paper reviews three main aspects of authentication protocols of Internet of Things (IoT): classifications and limitations, current trends, and opportunities. First, we explore the significance of IoT authentication protocols in ensuring secure communication and the protection of transmitted and received data, focusing on the classifications and associated limitations. Second, we discuss the latest developments and trends, such as using blockchain technology and machine learning to enhance authentication protocols. Third, we highlight the future opportunities, including the development of human-centric authentication designs and improved platform interoperability. At the end of this paper, we provided some insights gained for the new researcher, offering analyses of the trends and challenges in this field, giving recommendations for improving IoT authentication protocols, and emphasizing the need for further research and cooperation to develop advanced security solutions.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"515-533"},"PeriodicalIF":3.9000,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Sustainable Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10746325/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
This paper reviews three main aspects of authentication protocols of Internet of Things (IoT): classifications and limitations, current trends, and opportunities. First, we explore the significance of IoT authentication protocols in ensuring secure communication and the protection of transmitted and received data, focusing on the classifications and associated limitations. Second, we discuss the latest developments and trends, such as using blockchain technology and machine learning to enhance authentication protocols. Third, we highlight the future opportunities, including the development of human-centric authentication designs and improved platform interoperability. At the end of this paper, we provided some insights gained for the new researcher, offering analyses of the trends and challenges in this field, giving recommendations for improving IoT authentication protocols, and emphasizing the need for further research and cooperation to develop advanced security solutions.