A survey on user authentication and authorization protocols performance in The Internet of Things Environments

Publish Year: 1398
نوع سند: مقاله کنفرانسی
زبان: English
View: 677

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ETECH04_098

تاریخ نمایه سازی: 27 بهمن 1398

Abstract:

During last years, Internet-of-Thing (IoT) has been a new and challenging area in networking, and this idea becomes hot topic research area. Researchers are investigating to manage billion of things which connect to each other. In this scenario, it is an open issue to supply security concerns. This concept can implement in a wide range and different application, and the implementation can lead to many security vulnerabilities. Authentication and authorization are the main challenging security concerns in this environment because of architecture and nature of IoT. In this paper, we taxonomy attacks and authentication scheme and review performance evaluation of existing protocols and techniques. Ultimately, we classify protocols for comparing and studying their advantages and disadvantages.

Authors

Behrouz Zadmehr

AmirKabir University of Technology Tehran, Iran

Vahid Najaf Poor

Khatam-al Anbia Air Defense University Tehran, Iran

Marziyeh Nazari

AmirKabir University of Technology Tehran, Iran