A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics
The Internet of Things (IoT) is an emerging technology with a high market growth rate. In the IoT, machines and users from different levels must collaborate to exchange data and share resources. The IoT opens the door for a vast improvement in all aspects of human life. However, the increasing adopt...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2024-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10374291/ |
_version_ | 1827369204859273216 |
---|---|
author | Zeinab M. Iqal Ali Selamat Ondrej Krejcar |
author_facet | Zeinab M. Iqal Ali Selamat Ondrej Krejcar |
author_sort | Zeinab M. Iqal |
collection | DOAJ |
description | The Internet of Things (IoT) is an emerging technology with a high market growth rate. In the IoT, machines and users from different levels must collaborate to exchange data and share resources. The IoT opens the door for a vast improvement in all aspects of human life. However, the increasing adoption of the IoT in many sectors makes it difficult to control security risks. For this reason, there is a need for more effort in both research and industry to address the risks and find convenient solutions. This systematic literature review delves deeply into understanding the unique challenges and requirements posed by IoT environments. Through a detailed examination of 96 selected studies, this paper primarily addresses three research questions. The study concludes by summarizing key requirements, technologies, and metrics founded on our comprehensive analysis, aiming to steer further research in the domain. As IoT continues its expansion into various facets of our daily lives, there’s a paramount need to integrate with emerging technologies and ensure scalability. Prioritizing real-world implementations is crucial for the next wave of innovations in access control systems. |
first_indexed | 2024-03-08T09:42:50Z |
format | Article |
id | doaj.art-7e3bc5bddf5744cd9870b74ee80e98e4 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-03-08T09:42:50Z |
publishDate | 2024-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-7e3bc5bddf5744cd9870b74ee80e98e42024-01-30T00:03:38ZengIEEEIEEE Access2169-35362024-01-0112126361265410.1109/ACCESS.2023.334749510374291A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation MetricsZeinab M. Iqal0https://orcid.org/0009-0007-4572-3877Ali Selamat1https://orcid.org/0000-0001-9746-8459Ondrej Krejcar2https://orcid.org/0000-0002-5992-2574Faculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Johor, MalaysiaFaculty of Computing, Universiti Teknologi Malaysia, Johor Bahru, Johor, MalaysiaMalaysia-Japan International Institute of Technology (MJIIT), Universiti Teknologi Malaysia, Jalan Sultan Yahya Petra, Kuala Lumpur, MalaysiaThe Internet of Things (IoT) is an emerging technology with a high market growth rate. In the IoT, machines and users from different levels must collaborate to exchange data and share resources. The IoT opens the door for a vast improvement in all aspects of human life. However, the increasing adoption of the IoT in many sectors makes it difficult to control security risks. For this reason, there is a need for more effort in both research and industry to address the risks and find convenient solutions. This systematic literature review delves deeply into understanding the unique challenges and requirements posed by IoT environments. Through a detailed examination of 96 selected studies, this paper primarily addresses three research questions. The study concludes by summarizing key requirements, technologies, and metrics founded on our comprehensive analysis, aiming to steer further research in the domain. As IoT continues its expansion into various facets of our daily lives, there’s a paramount need to integrate with emerging technologies and ensure scalability. Prioritizing real-world implementations is crucial for the next wave of innovations in access control systems.https://ieeexplore.ieee.org/document/10374291/Access controlInternet of ThingsIoTsecuritysystematic review |
spellingShingle | Zeinab M. Iqal Ali Selamat Ondrej Krejcar A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics IEEE Access Access control Internet of Things IoT security systematic review |
title | A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics |
title_full | A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics |
title_fullStr | A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics |
title_full_unstemmed | A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics |
title_short | A Comprehensive Systematic Review of Access Control in IoT: Requirements, Technologies, and Evaluation Metrics |
title_sort | comprehensive systematic review of access control in iot requirements technologies and evaluation metrics |
topic | Access control Internet of Things IoT security systematic review |
url | https://ieeexplore.ieee.org/document/10374291/ |
work_keys_str_mv | AT zeinabmiqal acomprehensivesystematicreviewofaccesscontroliniotrequirementstechnologiesandevaluationmetrics AT aliselamat acomprehensivesystematicreviewofaccesscontroliniotrequirementstechnologiesandevaluationmetrics AT ondrejkrejcar acomprehensivesystematicreviewofaccesscontroliniotrequirementstechnologiesandevaluationmetrics AT zeinabmiqal comprehensivesystematicreviewofaccesscontroliniotrequirementstechnologiesandevaluationmetrics AT aliselamat comprehensivesystematicreviewofaccesscontroliniotrequirementstechnologiesandevaluationmetrics AT ondrejkrejcar comprehensivesystematicreviewofaccesscontroliniotrequirementstechnologiesandevaluationmetrics |