A survey on user authentication and authorization protocols performance in The Internet of Things Environments
سال انتشار: 1398
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 668
فایل این مقاله در 7 صفحه با فرمت PDF قابل دریافت می باشد
- صدور گواهی نمایه سازی
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
ETECH04_098
تاریخ نمایه سازی: 27 بهمن 1398
چکیده مقاله:
During last years, Internet-of-Thing (IoT) has been a new and challenging area in networking, and this idea becomes hot topic research area. Researchers are investigating to manage billion of things which connect to each other. In this scenario, it is an open issue to supply security concerns. This concept can implement in a wide range and different application, and the implementation can lead to many security vulnerabilities. Authentication and authorization are the main challenging security concerns in this environment because of architecture and nature of IoT. In this paper, we taxonomy attacks and authentication scheme and review performance evaluation of existing protocols and techniques. Ultimately, we classify protocols for comparing and studying their advantages and disadvantages.
کلیدواژه ها:
نویسندگان
Behrouz Zadmehr
AmirKabir University of Technology Tehran, Iran
Vahid Najaf Poor
Khatam-al Anbia Air Defense University Tehran, Iran
Marziyeh Nazari
AmirKabir University of Technology Tehran, Iran