A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics

The Internet of Things (IoT) is an emerging technology with a high market growth rate. In the IoT, machines and users from different levels must collaborate to exchange data and share resources. The IoT opens the door for a vast improvement in all aspects of human life. However, the increasing adopt...

Full description

Bibliographic Details
Main Authors: Zeinab M. Iqal, Ali Selamat, Ondrej Krejcar
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10374291/
_version_ 1827369204859273216
author Zeinab M. Iqal
Ali Selamat
Ondrej Krejcar
author_facet Zeinab M. Iqal
Ali Selamat
Ondrej Krejcar
author_sort Zeinab M. Iqal
collection DOAJ
description The Internet of Things (IoT) is an emerging technology with a high market growth rate. In the IoT, machines and users from different levels must collaborate to exchange data and share resources. The IoT opens the door for a vast improvement in all aspects of human life. However, the increasing adoption of the IoT in many sectors makes it difficult to control security risks. For this reason, there is a need for more effort in both research and industry to address the risks and find convenient solutions. This systematic literature review delves deeply into understanding the unique challenges and requirements posed by IoT environments. Through a detailed examination of 96 selected studies, this paper primarily addresses three research questions. The study concludes by summarizing key requirements, technologies, and metrics founded on our comprehensive analysis, aiming to steer further research in the domain. As IoT continues its expansion into various facets of our daily lives, there’s a paramount need to integrate with emerging technologies and ensure scalability. Prioritizing real-world implementations is crucial for the next wave of innovations in access control systems.
first_indexed 2024-03-08T09:42:50Z
format Article
id doaj.art-7e3bc5bddf5744cd9870b74ee80e98e4
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-08T09:42:50Z
publishDate 2024-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-7e3bc5bddf5744cd9870b74ee80e98e42024-01-30T00:03:38ZengIEEEIEEE Access2169-35362024-01-0112126361265410.1109/ACCESS.2023.334749510374291A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation MetricsZeinab M. Iqal0https://orcid.org/0009-0007-4572-3877Ali Selamat1https://orcid.org/0000-0001-9746-8459Ondrej Krejcar2https://orcid.org/0000-0002-5992-2574Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Johor, MalaysiaFaculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Johor, MalaysiaMalaysia-Japan International Institute of Technology (MJIIT), Universiti Teknologi Malaysia, Jalan Sultan Yahya Petra, Kuala Lumpur, MalaysiaThe Internet of Things (IoT) is an emerging technology with a high market growth rate. In the IoT, machines and users from different levels must collaborate to exchange data and share resources. The IoT opens the door for a vast improvement in all aspects of human life. However, the increasing adoption of the IoT in many sectors makes it difficult to control security risks. For this reason, there is a need for more effort in both research and industry to address the risks and find convenient solutions. This systematic literature review delves deeply into understanding the unique challenges and requirements posed by IoT environments. Through a detailed examination of 96 selected studies, this paper primarily addresses three research questions. The study concludes by summarizing key requirements, technologies, and metrics founded on our comprehensive analysis, aiming to steer further research in the domain. As IoT continues its expansion into various facets of our daily lives, there’s a paramount need to integrate with emerging technologies and ensure scalability. Prioritizing real-world implementations is crucial for the next wave of innovations in access control systems.https://ieeexplore.ieee.org/document/10374291/Access controlInternet of ThingsIoTsecuritysystematic review
spellingShingle Zeinab M. Iqal
Ali Selamat
Ondrej Krejcar
A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics
IEEE Access
Access control
Internet of Things
IoT
security
systematic review
title A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics
title_full A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics
title_fullStr A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics
title_full_unstemmed A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics
title_short A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics
title_sort comprehensive systematic review of access control in iot requirements technologies and evaluation metrics
topic Access control
Internet of Things
IoT
security
systematic review
url https://ieeexplore.ieee.org/document/10374291/
work_keys_str_mv AT zeinabmiqal acomprehensivesystematicreviewofaccesscontroliniotrequirementstechnologiesandevaluationmetrics
AT aliselamat acomprehensivesystematicreviewofaccesscontroliniotrequirementstechnologiesandevaluationmetrics
AT ondrejkrejcar acomprehensivesystematicreviewofaccesscontroliniotrequirementstechnologiesandevaluationmetrics
AT zeinabmiqal comprehensivesystematicreviewofaccesscontroliniotrequirementstechnologiesandevaluationmetrics
AT aliselamat comprehensivesystematicreviewofaccesscontroliniotrequirementstechnologiesandevaluationmetrics
AT ondrejkrejcar comprehensivesystematicreviewofaccesscontroliniotrequirementstechnologiesandevaluationmetrics