A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

Mohammad Kamrul Hasan, Zhou Weichen, Nurhizam Safie, Fatima Rayan Awad Ahmed, Taher M. Ghazal

Research output: Contribution to journalArticlepeer-review

18 Scopus citations

Abstract

The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and network communication technology to establish ubiquitous connectivity among people, machines, and objects. Due to its end devices' limited computing resources and storage space, it is not feasible to merely transpose traditional internet security technologies directly to IoT endpoints. Maintaining security while concurrently ensuring performance is a particularly challenging endeavor. This paper provides a review of key agreements and authentication protocols pivotal to the security of IoT. First, this survey discusses the applications that need authentication and key agreement to strengthen their security and current research on these application fields. Subsequently, this paper engages in an in-depth exploration of the phase involved in the scheme of authentication and key agreement, including an examination of the cryptographic techniques employed within these processes. This survey also thoroughly studies the scheme's security services, potential attacks, formal analysis and informal analysis to ensure resilience against such threats. This study aims to provide a profound understanding of the recent research on authentication and key agreement in IoT applications. It strives to contribute towards strengthening security systems for IoT applications, ensuring their sustainability in the face of evolving threats.

Original languageBritish English
Pages (from-to)61642-61666
Number of pages25
JournalIEEE Access
Volume12
DOIs
StatePublished - 2024

Keywords

  • AKA protocol
  • Cryptography
  • formal security analysis
  • Internet of Things
  • security and privacy

Fingerprint

Dive into the research topics of 'A Survey on Key Agreement and Authentication Protocol for Internet of Things Application'. Together they form a unique fingerprint.

Cite this