Application Layer Security Authentication Protocols for the Internet of Things: A Survey

Shruthi Narayanaswamy, Anitha Vijaya Kumar
2019 Advances in Science, Technology and Engineering Systems  
Network security challenges due to nearly limitless internet connectivity, platform limitations, ubiquitous nodal mobility and huge data transactions is burgeoning by the day and the need for transcend Internet of Things (IoT) based cloud security authentication protocols is on an exponential rise. Even though many secure classic layered security mechanisms are available for implementation, they cannot be applied on IoT devices because of the huge energy that they consume. The essence of the
more » ... er is an attempt to revisit the existing IoT based security authentication protocols operating in the Application Layer (AL) , AL being the end user's actual service provider. This gateway to the outside world definitely demands stringent and safe data handling and processing. The main objective of the paper is to highlight the positives of the AL protocols and also take a note of the drawbacks in terms of security and defensive measures. The author intends to support the users with information sufficient enough to decide on the type of protocol based on the application. The paper helps the future researchers to have a comparative analysis of each AL protocol's performance and further work on effective improvised defensive measures to tackle the threat-prone IoT environment even better. The paper discusses the architecture implementations, security provisions as well the pros and cons of certain avowed AL protocols currently being used in an IoT environment. Furthermore, the vulnerabilities and possible open issues currently encountered in the AL contribute valuably to the paper since they unravel the path to future research opportunities for secure interconnection of communicating devices.
doi:10.25046/aj040131 fatcat:jibfkxftcvhx3cjpyo6hd23dii