Review Article

A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Table 1

Security issues/challenges of authentication schemes for cloud-driven IoT and solutions.

Issues/challengesDescriptionSolution

Limited computation power and memory storageThe processing capability of IoT devices such as sensors does not have strength in terms of speed. Also, restricted memory storage makes IoT devices incapable of performing operations with high computational power.Design a user authentication scheme for IoT by employing lightweight cryptographic operations such as the Advanced Encryption Standard (AES) algorithm and cryptographic one-way hash function.
Energy requirementSome devices have confined battery backup that switches to the power saving mode to save energy when there is no activity. The battery backup restrictions cause difficulty in providing adequate security.Design a lightweight cryptography authentication scheme.
ScalabilityThe number of IoT devices enhances gradually.Design an authentication scheme with the functionality of smart sensing device augmentation.
MobilitySome devices are mobile such as a wearable sensing device that monitors a person temperature. These devices are connected to different networks based on the user location, which require various security configuration and settings.Develop a mobility-compliant security technique and interoperability among networks.
Support for heterogeneous devicesVarious devices such as a sensor or RFID tags have a different capability of computation, memory, and embedded software.Design a lightweight authentication scheme.
Dynamic security updatesIf a new smart device is added or removed, other entities should be notified through the trusted authority to update this in their memory to prevent security vulnerability.Employ P2P networks and develop mutual authentication mechanisms.
Protection against physical capturingIf an adversary may physically steal a smart device, the IoT sensor information can be exploited through power analysis attack to perform a malicious task such as replacing this device with another malicious device.Design the authentication scheme in which in case of a stolen device, the security of other parts does not get affected. Employing tamper-resistant packaging can be useful.
Security and privacyThe stored IoT sensors data at big data warehouse can be used for various kinds of analysis. This data disclosure can compromise data security and privacy.Apply machine-learning approaches to avoid data leakage.