About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Internet of Everything. Third EAI International Conference, IoECon 2024, Guimarães, Portugal, September 26–27, 2024, Proceedings

Research Article

Survey on IoT Device Authentication Protocols from Hash Based Schemes to Blockchain Based Schemes

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-84426-3_2,
        author={San\~{a} Elaoudi and Marouane Sebgui and Slimane Bah},
        title={Survey on IoT Device Authentication Protocols from Hash Based Schemes to Blockchain Based Schemes},
        proceedings={Internet of Everything. Third EAI International Conference, IoECon 2024, Guimar\"{a}es, Portugal, September 26--27, 2024, Proceedings},
        proceedings_a={IOECON},
        year={2025},
        month={3},
        keywords={IoT device authentication blockchain timestamp hash function cryptography PTP},
        doi={10.1007/978-3-031-84426-3_2}
    }
    
  • Sanâ Elaoudi
    Marouane Sebgui
    Slimane Bah
    Year: 2025
    Survey on IoT Device Authentication Protocols from Hash Based Schemes to Blockchain Based Schemes
    IOECON
    Springer
    DOI: 10.1007/978-3-031-84426-3_2
Sanâ Elaoudi1,*, Marouane Sebgui1, Slimane Bah1
  • 1: Ecole Mohammadia d’Ingénieur, University Mohammed V
*Contact email: sana-elaoudi@um5.ac.ma

Abstract

The use of IoT devices especially sensors and actuators continue to emerge across many domains: Smart city, Smart vehicle, Smart healthcare, Smart Factory. . . and influences the way we live and act nowadays. Nevertheless, IoT networks are subject to many security concerns related to privacy, data integrity, traceability, reliability and more. Device authentication is the key stone to prevent security attacks, guarantee the efficiency of the IoT network and ensure a reliable information exchange. Many works have been done around device-to-device and user-to-device authentication protocols and different factors have been considered: RFI tags, MAC address, PUF, Unique ID, . . . all aiming to provide an efficient and secure authentication scheme that suits the heterogeneous resource constrained IoT devices. In this paper we discuss several ways of device-to-device authentication for IoT applications presented by researchers to ensure enhanced authentication protocols and key exchange mechanisms. We also highlight common challenges for these mechanisms in relation with timestamp accuracy and time synchronization which seems to be a green field for scientific researches related to IoT.

Keywords
IoT device authentication blockchain timestamp hash function cryptography PTP
Published
2025-03-20
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-84426-3_2
Copyright © 2024–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL