z-logo
open-access-imgOpen Access
Study and Analysis of Various Authentication and Authorization for IoT Devices: A Challenging Overview
Author(s) -
Pallavi Sunil Bangare,
Kishor Patil
Publication year - 2022
Publication title -
international journal of safety and security engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.202
H-Index - 10
eISSN - 2041-904X
pISSN - 2041-9031
DOI - 10.18280/ijsse.120209
Subject(s) - authentication (law) , computer security , computer science , maintainability , authorization , standardization , internet of things , domain (mathematical analysis) , software engineering , mathematical analysis , mathematics , operating system
Nowadays, Internet of Things (IoT) is being achieved significant improvement in the scientific community. Both industry and academia are concentrated on the concepts of improving security, maintainability and utility through the improvement and standardization of optimal practices. There are various existing approaches are arisen in the security of IoT, ranging from cryptography to network security for identifying management. Thus, this paper focused on the security due to its impacts of limiting factors to adoption of wider IoT. This paper discusses the survey of various existing approaches suitable for IoT environment in the domain of authentication and authorization. Hence, this survey analyzes various techniques corresponding to authentication and authorization for IoT devices. This study is to utilize 25 research papers concentrated on various techniques and the review of researches technique-wise is to be provided. Finally, the survey will encourage the analysis based on the publication year, research methodology, performance metrics, and achievement of the research techniques toward authentication and authorization for IoT devices, as well as the journals. Finally, the research gaps and difficulties with the methodologies will be highlighted. Furthermore, the motive for establishing an effective approach for authentication and authorisation in IoT device techniques will be disclosed.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here