Amar N. Alsheavi;Ammar Hawbani;Xingfu Wang;Wajdy Othman;Liang Zhao;Zhi Liu;Saeed Hamood Alsamhi;Mohammed A. A. Al-Qaness
{"title":"物联网认证协议:分类、趋势和机遇","authors":"Amar N. Alsheavi;Ammar Hawbani;Xingfu Wang;Wajdy Othman;Liang Zhao;Zhi Liu;Saeed Hamood Alsamhi;Mohammed A. A. Al-Qaness","doi":"10.1109/TSUSC.2024.3492152","DOIUrl":null,"url":null,"abstract":"This paper reviews three main aspects of authentication protocols of Internet of Things (IoT): classifications and limitations, current trends, and opportunities. First, we explore the significance of IoT authentication protocols in ensuring secure communication and the protection of transmitted and received data, focusing on the classifications and associated limitations. Second, we discuss the latest developments and trends, such as using blockchain technology and machine learning to enhance authentication protocols. Third, we highlight the future opportunities, including the development of human-centric authentication designs and improved platform interoperability. At the end of this paper, we provided some insights gained for the new researcher, offering analyses of the trends and challenges in this field, giving recommendations for improving IoT authentication protocols, and emphasizing the need for further research and cooperation to develop advanced security solutions.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"515-533"},"PeriodicalIF":3.9000,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"IoT Authentication Protocols: Classification, Trend and Opportunities\",\"authors\":\"Amar N. Alsheavi;Ammar Hawbani;Xingfu Wang;Wajdy Othman;Liang Zhao;Zhi Liu;Saeed Hamood Alsamhi;Mohammed A. A. Al-Qaness\",\"doi\":\"10.1109/TSUSC.2024.3492152\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper reviews three main aspects of authentication protocols of Internet of Things (IoT): classifications and limitations, current trends, and opportunities. First, we explore the significance of IoT authentication protocols in ensuring secure communication and the protection of transmitted and received data, focusing on the classifications and associated limitations. Second, we discuss the latest developments and trends, such as using blockchain technology and machine learning to enhance authentication protocols. Third, we highlight the future opportunities, including the development of human-centric authentication designs and improved platform interoperability. At the end of this paper, we provided some insights gained for the new researcher, offering analyses of the trends and challenges in this field, giving recommendations for improving IoT authentication protocols, and emphasizing the need for further research and cooperation to develop advanced security solutions.\",\"PeriodicalId\":13268,\"journal\":{\"name\":\"IEEE Transactions on Sustainable Computing\",\"volume\":\"10 3\",\"pages\":\"515-533\"},\"PeriodicalIF\":3.9000,\"publicationDate\":\"2024-11-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Sustainable Computing\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10746325/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Sustainable Computing","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10746325/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
IoT Authentication Protocols: Classification, Trend and Opportunities
This paper reviews three main aspects of authentication protocols of Internet of Things (IoT): classifications and limitations, current trends, and opportunities. First, we explore the significance of IoT authentication protocols in ensuring secure communication and the protection of transmitted and received data, focusing on the classifications and associated limitations. Second, we discuss the latest developments and trends, such as using blockchain technology and machine learning to enhance authentication protocols. Third, we highlight the future opportunities, including the development of human-centric authentication designs and improved platform interoperability. At the end of this paper, we provided some insights gained for the new researcher, offering analyses of the trends and challenges in this field, giving recommendations for improving IoT authentication protocols, and emphasizing the need for further research and cooperation to develop advanced security solutions.