A survey on authentication methods for the Internet of Things [post]

Dylan Sey
2018 unpublished
This survey focuses on authentication methods for the Internet of Things (IoT). There are many different authentication methods that are used in the IT industry but not all of these can be adapted for the IoT. Lightweight and mutual authentication methods will be covered in this paper, alongside two authentication methods that are commonly used in other areas of the industry, rather than the IoT area, which are Kerberos and Group audio-based authentication. The survey will find that Mutual
more » ... nd that Mutual authentication is vital for the IoT and, due to the constraints that are apparent within the IoT devices; the lightweight option is very useful when it comes to dealing with areas like low bandwidth. As a result, there will be gaps that could be further investigated such as the advancement of the IoT technology so that more types of authentication are feasible. A conclusion to this paper is that, by combining different methods of encryption and authentication methods, there are always possibilities to make the proposed protocols more lightweight and secure.
doi:10.7287/peerj.preprints.26474 fatcat:q6k4si4r5fccrk4dhom3nkxtse