Open Access iconOpen Access

REVIEW

crossmark

Internet of Things Authentication Protocols: Comparative Study

Souhayla Dargaoui1, Mourade Azrour1,*, Ahmad El Allaoui1, Azidine Guezzaz2, Abdulatif Alabdulatif3, Abdullah Alnajim4

1 Engineering Science and Technology Laboratory, IDMS Team, Faculty of Sciences and Techniques, Moulay Ismail University of Meknes, Errachidia, 52000, Morocco
2 Higher School Essaouira, Cadi Ayyad University, Marrakesh, 44000, Morocco
3 Department of Computer Science, College of Computer, Qassim University, Buraydah, 51452, Saudi Arabia
4 Department of Information Technology, College of Computer, Qassim University, Buraydah, 51452, Saudi Arabia

* Corresponding Author: Mourade Azrour. Email: email

Computers, Materials & Continua 2024, 79(1), 65-91. https://doi.org/10.32604/cmc.2024.047625

Abstract

Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 and smart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still the biggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services provided by an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures, data, and devices. Authentication, as the first line of defense against security threats, becomes the priority of everyone. It can either grant or deny users access to resources according to their legitimacy. As a result, studying and researching authentication issues within IoT is extremely important. As a result, studying and researching authentication issues within IoT is extremely important. This article presents a comparative study of recent research in IoT security; it provides an analysis of recent authentication protocols from 2019 to 2023 that cover several areas within IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security research summary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. It illustrates that the resistance of protocols against attacks, and their computational and communication cost are linked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemes and provides some future research directions.

Keywords


Cite This Article

APA Style
Dargaoui, S., Azrour, M., Allaoui, A.E., Guezzaz, A., Alabdulatif, A. et al. (2024). Internet of things authentication protocols: comparative study. Computers, Materials & Continua, 79(1), 65-91. https://doi.org/10.32604/cmc.2024.047625
Vancouver Style
Dargaoui S, Azrour M, Allaoui AE, Guezzaz A, Alabdulatif A, Alnajim A. Internet of things authentication protocols: comparative study. Comput Mater Contin. 2024;79(1):65-91 https://doi.org/10.32604/cmc.2024.047625
IEEE Style
S. Dargaoui, M. Azrour, A.E. Allaoui, A. Guezzaz, A. Alabdulatif, and A. Alnajim, “Internet of Things Authentication Protocols: Comparative Study,” Comput. Mater. Contin., vol. 79, no. 1, pp. 65-91, 2024. https://doi.org/10.32604/cmc.2024.047625



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 799

    View

  • 459

    Download

  • 0

    Like

Share Link