A survey on user authentication and authorization protocols performance in The Internet of Things Environments

سال انتشار: 1398
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 668

فایل این مقاله در 7 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ETECH04_098

تاریخ نمایه سازی: 27 بهمن 1398

چکیده مقاله:

During last years, Internet-of-Thing (IoT) has been a new and challenging area in networking, and this idea becomes hot topic research area. Researchers are investigating to manage billion of things which connect to each other. In this scenario, it is an open issue to supply security concerns. This concept can implement in a wide range and different application, and the implementation can lead to many security vulnerabilities. Authentication and authorization are the main challenging security concerns in this environment because of architecture and nature of IoT. In this paper, we taxonomy attacks and authentication scheme and review performance evaluation of existing protocols and techniques. Ultimately, we classify protocols for comparing and studying their advantages and disadvantages.

نویسندگان

Behrouz Zadmehr

AmirKabir University of Technology Tehran, Iran

Vahid Najaf Poor

Khatam-al Anbia Air Defense University Tehran, Iran

Marziyeh Nazari

AmirKabir University of Technology Tehran, Iran