A survey on user authentication and authorization protocols performance in The Internet of Things Environments
Publish Year: 1398
نوع سند: مقاله کنفرانسی
زبان: English
View: 677
This Paper With 7 Page And PDF Format Ready To Download
- Certificate
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
ETECH04_098
تاریخ نمایه سازی: 27 بهمن 1398
Abstract:
During last years, Internet-of-Thing (IoT) has been a new and challenging area in networking, and this idea becomes hot topic research area. Researchers are investigating to manage billion of things which connect to each other. In this scenario, it is an open issue to supply security concerns. This concept can implement in a wide range and different application, and the implementation can lead to many security vulnerabilities. Authentication and authorization are the main challenging security concerns in this environment because of architecture and nature of IoT. In this paper, we taxonomy attacks and authentication scheme and review performance evaluation of existing protocols and techniques. Ultimately, we classify protocols for comparing and studying their advantages and disadvantages.
Keywords:
Authors
Behrouz Zadmehr
AmirKabir University of Technology Tehran, Iran
Vahid Najaf Poor
Khatam-al Anbia Air Defense University Tehran, Iran
Marziyeh Nazari
AmirKabir University of Technology Tehran, Iran