Jameel Shehu Yalli;Mohd Hilmi Hasan;Low Tang Jung;Abdulrasheed Ibrahim Yerima;Dahiru Adamu Aliyu;Umar Danjuma Maiwada;Safwan Mahmood Al-Selwi;Mujeeb Ur Rehman Shaikh
{"title":"A Systematic Review for Evaluating IoT Security: A Focus on Authentication, Protocols and Enabling Technologies","authors":"Jameel Shehu Yalli;Mohd Hilmi Hasan;Low Tang Jung;Abdulrasheed Ibrahim Yerima;Dahiru Adamu Aliyu;Umar Danjuma Maiwada;Safwan Mahmood Al-Selwi;Mujeeb Ur Rehman Shaikh","doi":"10.1109/JIOT.2025.3545737","DOIUrl":null,"url":null,"abstract":"The idea of the Internet of Things (IoT) is to connect objects and smart devices with any digital element seamlessly at anytime, anywhere, with anything. These devices or objects are characterized by low power consumption, lower bandwidth usage, limited processing power, and limited memory capacity. This article presents a systematic literature review (SLR) of the state-of-the-art security challenges of IoT systems designed for authentication. It reports the strengths, weaknesses, threats, and attacks associated with the proposed authentication models. In addition, a comprehensive analysis of IoT-compatible protocols, enabling technologies, and countermeasures to mitigate risk in IoT is investigated. This study uses the PRISMA methodology to review peer-reviewed articles published from 2014 to 2023, studying 100+ papers by selecting approximately 10 papers each year. It provides a detailed overview that contrasts and compares the advances in securing IoT devices to date while identifying remaining open research questions for IoT security designs. This article highlights the need for a survey integrating authentication models with compatible protocols and other lightweight technologies. The examination and analysis in this work contribute to the body of knowledge and serve as a roadmap for researchers and practitioners to improve their work while designing IoT security models.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 12","pages":"18908-18928"},"PeriodicalIF":8.9000,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10904108","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10904108/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The idea of the Internet of Things (IoT) is to connect objects and smart devices with any digital element seamlessly at anytime, anywhere, with anything. These devices or objects are characterized by low power consumption, lower bandwidth usage, limited processing power, and limited memory capacity. This article presents a systematic literature review (SLR) of the state-of-the-art security challenges of IoT systems designed for authentication. It reports the strengths, weaknesses, threats, and attacks associated with the proposed authentication models. In addition, a comprehensive analysis of IoT-compatible protocols, enabling technologies, and countermeasures to mitigate risk in IoT is investigated. This study uses the PRISMA methodology to review peer-reviewed articles published from 2014 to 2023, studying 100+ papers by selecting approximately 10 papers each year. It provides a detailed overview that contrasts and compares the advances in securing IoT devices to date while identifying remaining open research questions for IoT security designs. This article highlights the need for a survey integrating authentication models with compatible protocols and other lightweight technologies. The examination and analysis in this work contribute to the body of knowledge and serve as a roadmap for researchers and practitioners to improve their work while designing IoT security models.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.