Current Status and Challenges of IoT Device Identity Authentication Technology

Main Article Content

Yixuan Dou

Keywords

IoT, device authentication, security, identity management, cryptography, PUF, blockchain

Abstract

The Internet of Things (IoT) has witnessed exponential growth, integrating billions of devices into our daily lives. A critical challenge in realizing the full potential of IoT lies in ensuring the secure and reliable authentication of these devices. This review paper provides a comprehensive overview of the current status and challenges of IoT device identity authentication technology. We begin by outlining the fundamental requirements for IoT device authentication, considering the resource-constrained nature of many IoT devices and the diverse application scenarios. We explore the historical evolution of authentication methods, from traditional password-based schemes to more sophisticated cryptographic protocols, highlighting their strengths and weaknesses in the context of IoT. The core of this review focuses on analyzing prominent authentication technologies, including symmetric-key based approaches, public-key infrastructure (PKI), and lightweight authentication protocols designed specifically for IoT. Furthermore, we delve into emerging authentication techniques based on physical unclonable functions (PUFs) and blockchain technology. We critically compare the performance, security, and scalability of these different approaches, considering factors such as computational overhead, communication costs, and resilience against various attacks. We address key challenges, including the need for interoperability, the management of device identities throughout their lifecycle, and the mitigation of risks associated with compromised devices. Finally, we offer perspectives on future research directions, emphasizing the importance of developing adaptive authentication mechanisms, enhancing privacy preservation, and addressing the evolving threat landscape in the IoT ecosystem. This review aims to provide researchers, developers, and policymakers with a valuable resource for understanding the current state-of-the-art and the open challenges in IoT device identity authentication.

Abstract 7 | PDF Downloads 5

References

  • [1] H. Kim and E. A. Lee, “Authentication and Authorization for the Internet of Things,” IT Professional, vol. 19, no. 5, pp. 27-33, 2017.
  • [2] Z. A. Alizai, N. F. Tareen, and I. Jadoon, “Improved IoT device authentication scheme using device capability and digital signatures,” in 2018 International Conference on Applied and Engineering Mathematics (ICAEM), 2018, pp. 1-5.
  • [3] B. Kim, S. Yoon, Y. Kang, and D. Choi, “Puf based iot device authentication scheme,” in 2019 International Conference on Information and Communication Technology Convergence (ICTC), 2019, pp. 1460-1462.
  • [4] T. Nandy, M. Y. I. B. Idris, R. M. Noor, L. M. Kiah, L. S. Lun, N. B. A. Juma’at, et al., “Review on security of internet of things authentication mechanism,” IEEE Access, vol. 7, pp. 151054-151089, 2019.
  • [5] J. R. Wallrabenstein, “Practical and secure IoT device authentication using physical unclonable functions,” in 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), 2016, pp. 99-106.
  • [6] M. Liyanage, A. Braeken, P. Kumar, and M. Ylianttila, Eds., IoT security: Advances in authentication. John Wiley & Sons, 2020.
  • [7] Y. Sharaf-Dabbagh and W. Saad, “On the authentication of devices in the Internet of Things,” in 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2016, pp. 1-3.
  • [8] Ali, S. Sabir, and Z. Ullah, “Internet of things security, device authentication and access control: a review,” arXiv preprint arXiv:1901.07309, 2019.
  • [9] Y. Atwady and M. Hammoudeh, “A survey on authentication techniques for the internet of things,” in Proceedings of the international conference on future networks and distributed systems, 2017.
  • [10] M. El-Hajj, A. Fadlallah, M. Chamoun, and A. Serhrouchni, “A survey of internet of things (IoT) authentication schemes,” Sensors, vol. 19, no. 5, 1141, 2019.
  • [11] S. Miri Kelaniki and N. Komninos, “A Study on IoT Device Authentication Using Artificial Intelligence,” Sensors, vol. 25, no. 18, 5809, 2025.
  • [12] Lucia, B. Isong, N. Gasela, and A. M. Abu-Mahfouz, “Device authentication schemes in IoT: a review,” in 2019 International Multidisciplinary Information Technology and Engineering Conference (IMITEC), 2019, pp. 1-6.