Summary: | M2M communication is the next vital part of IoT infrastructure. It is extremely important for IoT systems to prosper in machine-type communication (MTC) devices that have low computational power, limited energy and small amount of memory capabilities. Thousands of devices transmitting data while working remotely and independent of any external supervision, creates concern for the security of data and devices as the topology is totally different to that of personal computers. In relation to the security of the devices, authentication is the first important part that has to be addressed against all possible security threats in IoT communication. In this regard, we focus on different types of authentication techniques being carried out by the researchers in M2M communicating environment of several remotely operating devices and address their security threats.
|