Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

Authentication and Access Control Mechanisms to Secure IoT Environments: A comprehensive SLR

Version 1 : Received: 14 May 2024 / Approved: 14 May 2024 / Online: 14 May 2024 (09:55:11 CEST)

How to cite: Almarri, S.; Frikha, M. Authentication and Access Control Mechanisms to Secure IoT Environments: A comprehensive SLR. Preprints 2024, 2024050948. https://doi.org/10.20944/preprints202405.0948.v1 Almarri, S.; Frikha, M. Authentication and Access Control Mechanisms to Secure IoT Environments: A comprehensive SLR. Preprints 2024, 2024050948. https://doi.org/10.20944/preprints202405.0948.v1

Abstract

Due to the rapid growth of the Internet of Things (IoT), securing communications between a huge number of devices has become very difficult. Access controls and authentication secure the connection between IoT devices and protect sensitive data from unauthorized users or malicious attackers. In this paper, we provide a comprehensive review to emphasize the critical role of authentication and access control in securing IoT environments. This paper explores different types of access controls, like Attribute-Based Access Control and Role-Based Access Control. Furthermore, it demonstrates different authentication techniques, like passwords and biometrics. Based on the previous mechanisms, we discuss different IoT security challenges regarding authentication and access control mechanisms and highlight future directions. In addition, this paper investigates the integration between access control and authentication to safeguard IoT communications.

Keywords

IoT; access control; authentication; attribute-based access control; role-based access control

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.