Skip to main content

A Survey on Methodologies and Algorithms for Mutual Authentication in IoT Devices

  • Conference paper
  • First Online:
Evolutionary Computing and Mobile Sustainable Networks

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 53))

  • 1042 Accesses

Abstract

Authentication refers to the process of proving the identity of the IoT device or simply, it is an act of verifying the identity of the system. The scenario where two communicating parties authenticate each other at nearly the same time is called two-way authentication or mutual authentication. Mutual authentication provides trusted communication between remote IoT devices. This paper is aimed at performing a survey on various algorithms used for mutual authentication of IoT devices. The classification has been done based on the parameters used for authentication, its simplicity, optimality, and efficiency of the algorithm. An abstract analysis of the methodologies is illustrated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Harish Kumar N, Deepak G (2019) Authentication and privacy for IoT objects: a survey. J Emerg Technol Innov Res 6(4):268–271

    Google Scholar 

  2. Aman MN, Chua KC, Sikdar B (2017) Mutual Authentication in IoT Systems Using Physical Unclonable Functions. IEEE Internet of Things Journal 4(5):1327–1340

    Article  Google Scholar 

  3. Li, Q., Cao, G, “Multicast Authentication in Smart Grid with One-Time Signature. IEEE Trans. smart grid,” pp. 686–696, 2011

    Google Scholar 

  4. He K, Weng J, Liu J-N, Liu JK, Liu W, Deng RH (2016) Anonymous identity-based broadcast encryption with chose ciphertext security. In: Proceedings of the 11th ACM on Asia conference on computer and communications security—ASIA CCS’16

    Google Scholar 

  5. Mehmood Z, Chen G, Li J, Li L, Alzahrani B (2017) A robust ECC based mutual authentication protocol with anonymity for session initiation protocol. PLoS ONE 12(10):e0186044

    Article  Google Scholar 

  6. Bala DQ, Maity S, Jena SK (2017) Mutual authentication for IoT smart environment using certificate-less public key cryptography. In: 2017 third international conference on sensing, signal processing and security (ICSSS)

    Google Scholar 

  7. Lyubashevsky V, Masny D (2013) Man-in-the-middle secure authentication schemes from LPN and weak PRFs. In: Canetti R, Garay JA (eds) Advances in cryptology—CRYPTO 2013. Springer, Berlin, pp 308–325

    Google Scholar 

  8. Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Ind Inf 14:1656–1665

    Article  Google Scholar 

  9. Park N, Kim M, Bang HC (2015) Symmetric key-based authentication and the session key agreement scheme in IoT environment. Lecture notes in electrical engineering, pp 379–384

    Google Scholar 

  10. Tewari A, Gupta BB (2016) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73(3):1085–1102

    Article  Google Scholar 

  11. Jan MA, Khan F, Alam M, Usman M (2017) A payload-based mutual authentication scheme for the Internet of Things. Futur Gener Comput Syst

    Google Scholar 

  12. Kulseng L, Yu Z, Wei Y, Guan Y (2010) Lightweight Mutual authentication and ownership transfer for RFID systems. In: 2010 proceedings IEEE INFOCOM

    Google Scholar 

  13. Li N, Liu D, Nepal S (2017) Lightweight mutual authentication for IoT and its applications. IEEE Trans Sustain Comput 2(4):359–370

    Article  Google Scholar 

  14. Chen M, Chen S, Fang Y (2017) Lightweight anonymous authentication protocols for RFID systems. IEEE/ACM Trans Netw 25:1475–1488

    Article  Google Scholar 

  15. Aghili SF, Mala H (2018) Security analysis of Fan et al. lightweight RFID authentication protocol for privacy protection IoT. Cryptology ePrint archive, report 2018/388

    Google Scholar 

  16. Chaudhry SA (2015) Comment on ‘robust and efficient password-authenticated key agreement with user anonymity for session initiation protocol-based communications. IET Commun 9(7):1034

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rashmi R. Sonth .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sonth, R.R., Pranamya, Y.R., Harish Kumar, N., Deepak, G. (2021). A Survey on Methodologies and Algorithms for Mutual Authentication in IoT Devices. In: Suma, V., Bouhmala, N., Wang, H. (eds) Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 53. Springer, Singapore. https://doi.org/10.1007/978-981-15-5258-8_30

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-5258-8_30

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-5257-1

  • Online ISBN: 978-981-15-5258-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics