当前位置: X-MOL 学术Comput. Commun. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A survey on continuous authentication methods in Internet of Things environment
Computer Communications ( IF 4.5 ) Pub Date : 2020-09-16 , DOI: 10.1016/j.comcom.2020.09.006
Fatimah Hussain Al-Naji , Rachid Zagrouba

IoT environment merges the digital and physical universes and enabling them to communicate real-time data It is crucial to constantly ensure that the user is not impersonated which brings a particular type of authentication known as continuous authentication. Therefore, this survey is primary attempt to present an overview about continuous authentication methods in IoT environment, where Blockchain-related solutions provided in this context is also discussed. Subsequently, we overview IoT environment and classify IoT attacks based on its layers with the corresponding proposed countermeasures. Next, we identify a number of open issues that must be taken into account when developing authentication schemes for IoT. We further contribute to this survey by providing a comprehensive analysis of designing continuous authentication process. Besides, we highlight the primary advantages of continuous authentication over the static authentication scheme. In this context, we review relevant works that have proposed Blockchain-based solution to strength the security of IoT systems. We further contribute to present, analyze, and compare user-related IoT-based continuous authentication solutions. Also, we present the solutions that integrate Blockchain. Finally, several research directions and open challenges are identified.



中文翻译:

物联网环境下连续认证方法的研究

物联网环境融合了数字世界和物理世界,并使它们能够通信实时数据。至关重要的一点是,不断确保不会模仿用户,这带来了一种称为连续认证的特殊类型的认证。因此,本次调查是对IoT环境中的连续身份验证方法进行概述的主要尝试,其中还讨论了在此上下文中提供的与区块链相关的解决方案。随后,我们概述了物联网环境,并根据物联网攻击的层次对物联网攻击进行分类,并提出了相应的对策。接下来,我们确定在开发物联网身份验证方案时必须考虑的许多未解决问题。我们通过提供对设计连续认证过程的全面分析,进一步为这项调查做出贡献。除了,我们强调了连续认证相对于静态认证方案的主要优势。在这种情况下,我们将回顾相关工作,这些工作提出了基于区块链的解决方案,以增强物联网系统的安全性。我们进一步致力于提供,分析和比较与用户相关的,基于IoT的连续身份验证解决方案。此外,我们提出了集成区块链的解决方案。最后,确定了几个研究方向和公开挑战。我们提出了集成区块链的解决方案。最后,确定了几个研究方向和公开挑战。我们提出了集成区块链的解决方案。最后,确定了几个研究方向和公开挑战。

更新日期:2020-09-20
down
wechat
bug