Group-based authentication schemes used for machine type communication devices in WSN: a review

M2M communication is the next vital part of IoT infrastructure. It is extremely important for IoT systems to prosper in machine-type communication (MTC) devices that have low computational power, limited energy and small amount of memory capabilities. Thousands of devices transmitting data while wor...

Full description

Bibliographic Details
Main Authors: Ullah, S., Raja Zahilah, Raja Zahilah, Md. Arshad, Marina, Abdullah, Abdul Hanan, Kadir, Rashidah
Format: Conference or Workshop Item
Language:English
Published: 2020
Subjects:
Online Access:http://eprints.utm.my/89849/1/SUllah2020_Group-BasedAuthenticationSchemes.pdf
Description
Summary:M2M communication is the next vital part of IoT infrastructure. It is extremely important for IoT systems to prosper in machine-type communication (MTC) devices that have low computational power, limited energy and small amount of memory capabilities. Thousands of devices transmitting data while working remotely and independent of any external supervision, creates concern for the security of data and devices as the topology is totally different to that of personal computers. In relation to the security of the devices, authentication is the first important part that has to be addressed against all possible security threats in IoT communication. In this regard, we focus on different types of authentication techniques being carried out by the researchers in M2M communicating environment of several remotely operating devices and address their security threats.