Open Access
REVIEW
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
1 Department of Computer Engineering, Balochistan University of Information Technology, Engineering and Management Sciences, Quetta, 87300, Pakistan
2 Department of Information Technology, Balochistan University of Information Technology, Engineering, and Management Sciences, Quetta, 87300, Pakistan
3 Department of Information Systems, College of Computer Sciences and Information Technology, King Faisal University, Hofuf in Al-Ahsa, 31982, Saudi Arabia
4 Department of Management Information Systems, College of Business Administration, King Faisal University, Hofuf in Al-Ahsa, 31982, Saudi Arabia
5 Department of Software Engineering, College of Computing, Riphah International University, Faisalabad, 44000, Pakistan
6 Department of Electrical Engineering Balochistan University of Information Technology, Engineering, and Management Sciences, Quetta, 87300, Pakistan
7 Department of Mathematics, College of Science Al-Zulfi, Majmaah University, Al-Majmaah, 11952, Saudi Arabia
* Corresponding Authors: Sibghat Ullah Bazai. Email: ; Qazi Mudassar Ilyas. Email:
(This article belongs to the Special Issue: Advances and Applications in Signal, Image and Video Processing)
Computers, Materials & Continua 2024, 79(1), 93-115. https://doi.org/10.32604/cmc.2024.048796
Received 19 December 2023; Accepted 14 February 2024; Issue published 25 April 2024
Abstract
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices (MTCDs) regularly share extensive data without human intervention while making all types of decisions. These decisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeat monitoring, and several different alert systems. Many of these devices simultaneously share data to form an automated system. The data shared between machine-type communication devices (MTCDs) is prone to risk due to limited computational power, internal memory, and energy capacity. Therefore, securing the data and devices becomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions, and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data is authentication, where each device must be verified before data transmission. Several M2M authentication schemes have been proposed in the literature, however, the literature lacks a comprehensive overview of current M2M authentication techniques and the challenges associated with them. To utilize a suitable authentication scheme for specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fills this gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerning application categories, security provisions, and performance efficiency.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.