Privacy Preservation and Security Dilemma : Relationship proposition for IoT authentication

Internet of Things (IoT) authentication demands a complex approach to ensure all facets of security are taken care of. Security in IoT is not complete without looking at privacy protection especially if sensitive data is involved. Privacy of user credentials is critically important as that holds pieces of data that can compromise the whole security system. The need to emphasize on privacy preserving for authentication is on the basis that, we need to complete the security puzzle unequivocally. One of the security worries in IoT is user data privacy as a result of the unsupervised nature of IoT device’s interaction. Focusing on smart home environments and personal area networks to a large extent, this paper gives an overview on some of the existing solutions that employs privacy preserving attributes towards providing IoT authentication security solutions in the quest to try and provide the relationship between privacy and security.

[1]  Xuemin Shen,et al.  Lightweight Authentication and Privacy-Preserving Scheme for V2G Connections , 2017, IEEE Transactions on Vehicular Technology.

[2]  Li Yingbo,et al.  A secure and lightweight authentication protocol for RFID , 2015, 2015 IEEE 5th International Conference on Electronics Information and Emergency Communication.

[3]  Eun-Jun Yoon,et al.  Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.

[4]  Qusay H. Mahmoud,et al.  A context-aware authentication framework for smart homes , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).

[5]  Nazar Abbas Saqib,et al.  Internet of Things data analytics for user authentication and activity recognition , 2017, 2017 Second International Conference on Fog and Mobile Edge Computing (FMEC).

[6]  Giridhar D. Mandyam Tiered attestation for Internet-of-Things (IoT) devices , 2017, 2017 9th International Conference on Communication Systems and Networks (COMSNETS).

[7]  Samiran Chattopadhyay,et al.  Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things , 2018, IEEE Internet of Things Journal.

[8]  Jian Shen,et al.  A lightweight and practical RFID grouping authentication protocol in multiple-tag arrangements , 2015, 2015 17th International Conference on Advanced Communication Technology (ICACT).

[9]  Jiguo Yu,et al.  A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).

[10]  Weidong Yang,et al.  A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[11]  Zhonglei Gu,et al.  Scalable Group Audio-Based Authentication Scheme for IoT Devices , 2016, 2016 12th International Conference on Computational Intelligence and Security (CIS).

[12]  Pinaki Ghosh,et al.  A privacy preserving mutual authentication protocol for RFID based automated toll collection system , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).

[13]  Dhiren R. Patel,et al.  Energy efficient integrated authentication and access control mechanisms for Internet of Things , 2016, 2016 International Conference on Internet of Things and Applications (IOTA).

[14]  Zygmunt J. Haas,et al.  Security and Privacy in the Internet-of-Things Under Time-and-Budget-Limited Adversary Model , 2015, IEEE Wireless Communications Letters.

[15]  Hossein Gharaee,et al.  Lightweight, anonymous and mutual authentication in IoT infrastructure , 2016, 2016 8th International Symposium on Telecommunications (IST).

[16]  Hokeun Kim,et al.  Authentication and Authorization for the Internet of Things , 2017, IT Professional.

[17]  Hikaru Kishimoto,et al.  An Anonymous Authentication Protocol for Smart Grid , 2017, 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA).

[18]  Jie Cui,et al.  A Lightweight and Secure Data Authentication Scheme with Privacy Preservation for Wireless Sensor Networks , 2016, 2016 International Conference on Networking and Network Applications (NaNA).