Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends

Strengths and weaknesses
DOI: 10.1007/s40747-022-00765-y Publication Date: 2022-05-19T13:03:41Z
ABSTRACT
Abstract Scalable and secure authorization of smart things is the crucial essence for successful deployment Internet Things (IoT). Unauthorized access to could exacerbate security privacy concern, which could, in turn, lead reduced adoption IoT, ultimately emergence severe threats. Even though there are a variety IoT solutions authorization, schemes highly dynamic distributed environments remain daunting challenge. Access rights can dynamically change due heterogeneous nature shared devices and, thus, identity control management challenging. This survey provides comprehensive comparative analysis current state-of-the-art highlight their strengths weaknesses. Then, it defines most important requirements highlights threats weaknesses impacting IoT. Finally, presents ongoing open challenges recommendations future research.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (89)
CITATIONS (22)