Abstract
Authentication refers to the process of proving the identity of the IoT device or simply, it is an act of verifying the identity of the system. The scenario where two communicating parties authenticate each other at nearly the same time is called two-way authentication or mutual authentication. Mutual authentication provides trusted communication between remote IoT devices. This paper is aimed at performing a survey on various algorithms used for mutual authentication of IoT devices. The classification has been done based on the parameters used for authentication, its simplicity, optimality, and efficiency of the algorithm. An abstract analysis of the methodologies is illustrated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Harish Kumar N, Deepak G (2019) Authentication and privacy for IoT objects: a survey. J Emerg Technol Innov Res 6(4):268–271
Aman MN, Chua KC, Sikdar B (2017) Mutual Authentication in IoT Systems Using Physical Unclonable Functions. IEEE Internet of Things Journal 4(5):1327–1340
Li, Q., Cao, G, “Multicast Authentication in Smart Grid with One-Time Signature. IEEE Trans. smart grid,” pp. 686–696, 2011
He K, Weng J, Liu J-N, Liu JK, Liu W, Deng RH (2016) Anonymous identity-based broadcast encryption with chose ciphertext security. In: Proceedings of the 11th ACM on Asia conference on computer and communications security—ASIA CCS’16
Mehmood Z, Chen G, Li J, Li L, Alzahrani B (2017) A robust ECC based mutual authentication protocol with anonymity for session initiation protocol. PLoS ONE 12(10):e0186044
Bala DQ, Maity S, Jena SK (2017) Mutual authentication for IoT smart environment using certificate-less public key cryptography. In: 2017 third international conference on sensing, signal processing and security (ICSSS)
Lyubashevsky V, Masny D (2013) Man-in-the-middle secure authentication schemes from LPN and weak PRFs. In: Canetti R, Garay JA (eds) Advances in cryptology—CRYPTO 2013. Springer, Berlin, pp 308–325
Fan K, Jiang W, Li H, Yang Y (2018) Lightweight RFID protocol for medical privacy protection in IoT. IEEE Trans Ind Inf 14:1656–1665
Park N, Kim M, Bang HC (2015) Symmetric key-based authentication and the session key agreement scheme in IoT environment. Lecture notes in electrical engineering, pp 379–384
Tewari A, Gupta BB (2016) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73(3):1085–1102
Jan MA, Khan F, Alam M, Usman M (2017) A payload-based mutual authentication scheme for the Internet of Things. Futur Gener Comput Syst
Kulseng L, Yu Z, Wei Y, Guan Y (2010) Lightweight Mutual authentication and ownership transfer for RFID systems. In: 2010 proceedings IEEE INFOCOM
Li N, Liu D, Nepal S (2017) Lightweight mutual authentication for IoT and its applications. IEEE Trans Sustain Comput 2(4):359–370
Chen M, Chen S, Fang Y (2017) Lightweight anonymous authentication protocols for RFID systems. IEEE/ACM Trans Netw 25:1475–1488
Aghili SF, Mala H (2018) Security analysis of Fan et al. lightweight RFID authentication protocol for privacy protection IoT. Cryptology ePrint archive, report 2018/388
Chaudhry SA (2015) Comment on ‘robust and efficient password-authenticated key agreement with user anonymity for session initiation protocol-based communications. IET Commun 9(7):1034
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sonth, R.R., Pranamya, Y.R., Harish Kumar, N., Deepak, G. (2021). A Survey on Methodologies and Algorithms for Mutual Authentication in IoT Devices. In: Suma, V., Bouhmala, N., Wang, H. (eds) Evolutionary Computing and Mobile Sustainable Networks. Lecture Notes on Data Engineering and Communications Technologies, vol 53. Springer, Singapore. https://doi.org/10.1007/978-981-15-5258-8_30
Download citation
DOI: https://doi.org/10.1007/978-981-15-5258-8_30
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5257-1
Online ISBN: 978-981-15-5258-8
eBook Packages: EngineeringEngineering (R0)