• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication:Issues and Challenges

    2024-05-25 14:38:48ShafiUllahSibghatUllahBazaiMohammadImranQaziMudassarIlyasAbidMehmoodMuhammadAsimSaleemMuhmmadAasimRafiqueArsalanHaiderIlyasKhanSajidIqbalYonisGulzarandKauserHameed
    Computers Materials&Continua 2024年4期

    Shafi Ullah ,Sibghat Ullah Bazai,? ,Mohammad Imran ,Qazi Mudassar Ilyas ,Abid Mehmood ,Muhammad Asim Saleem ,Muhmmad Aasim Rafique,Arsalan Haider,Ilyas Khan,Sajid Iqbal,Yonis Gulzar and Kauser Hameed

    1Department of Computer Engineering,Balochistan University of Information Technology,Engineering and Management Sciences,Quetta,87300,Pakistan

    2Department of Information Technology,Balochistan University of Information Technology,Engineering,and Management Sciences,Quetta,87300,Pakistan

    3Department of Information Systems,College of Computer Sciences and Information Technology,King Faisal University,Hofuf in Al-Ahsa,31982,Saudi Arabia 4Department of Management Information Systems,College of Business Administration,King Faisal University,Hofuf in Al-Ahsa,31982,Saudi Arabia

    5Department of Software Engineering,College of Computing,Riphah International University,Faisalabad,44000,Pakistan

    6Department of Electrical Engineering Balochistan University of Information Technology,Engineering,and Management Sciences,Quetta,87300,Pakistan

    7Department of Mathematics,College of Science Al-Zulfi,Majmaah University,Al-Majmaah,11952,Saudi Arabia

    ABSTRACT Machine-to-machine(M2M)communication plays a fundamental role in autonomous IoT(Internet of Things)-based infrastructure,a vital part of the fourth industrial revolution.Machine-type communication devices(MTCDs)regularly share extensive data without human intervention while making all types of decisions.These decisions may involve controlling sensitive ventilation systems maintaining uniform temperature,live heartbeat monitoring,and several different alert systems.Many of these devices simultaneously share data to form an automated system.The data shared between machine-type communication devices(MTCDs)is prone to risk due to limited computational power,internal memory,and energy capacity.Therefore,securing the data and devices becomes challenging due to factors such as dynamic operational environments,remoteness,harsh conditions,and areas where human physical access is difficult.One of the crucial parts of securing MTCDs and data is authentication,where each device must be verified before data transmission.Several M2M authentication schemes have been proposed in the literature,however,the literature lacks a comprehensive overview of current M2M authentication techniques and the challenges associated with them.To utilize a suitable authentication scheme for specific scenarios,it is important to understand the challenges associated with it.Therefore,this article fills this gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerning application categories,security provisions,and performance efficiency.

    KEYWORDS Authentication;cyber security;internet of things;machine-type communication devices;machine-to-machine communication

    1 Introduction

    Internet usage has become an indispensable part of routine life.It has become integral in every facet of human lives,whether directly or indirectly,encompassing finance,education,healthcare,and social interactions.As of 2023,the global count of internet users has reached 5.18 billion,which indicates that approximately two-thirds of the world’s population is presently linked to the World Wide Web [1,2].Besides,the world of automation has also created a surge.It has not only enabled humans to communicate over the Internet but also enabled machines to communicate with each other through M2M(machine-to-machine)and MTCDs(machine-type communication devices)technologies where human intervention is no longer a mandate.It is estimated that by 2025,over fifty billion devices will be employed in the cause.Compact and well-designed equipment,also known as MTC (machine-type communication) devices,are handed down in everyone’s life,ranging from smart refrigerators,televisions,and air-conditioner controllers to smart health devices,smart offices,and smart parking.These devices serve multiple functions,such as monitoring air quality in homes,sensing the environment in cities,granting access to authorized personnel in the office via smart doors,regulating specific machines controlled by the ventilation system,and tracking vital signs like heart rate and body temperature,transmitting this health data to physicians,securing parking spots in advance on busy streets,and generating environmental data for informed decision-making and future predictions.These devices utilize internet connectivity to share data and execute tasks based on pre-programmed logic.Despite their small size,cost-effectiveness,and limited computational abilities,these diminutive yet intelligent devices communicate,exchanging information as depicted in Fig.1.

    Figure 1: M2M communication applications

    The information exchanged by these MTCs can range from public data to overly sensitive information.For instance,a device might share temperature data from a power station to regulate fans,while another might transmit a remote heart patient’s heartbeat data to their doctor.Similarly,lifethreatening dangers can arise from hacking into medical device MTCDs.In smart grids,unauthorized access can potentially interfere with electricity distribution and cause blackouts.In the case of industrial IoT (Internet of Things) networks,unauthorized access can impact safety and manufacturing operations.In the context of smart homes,unauthorized control of IoT devices threatens the privacy and security of residents [1].Similarly,certain devices control access to secure military facilities.In these scenarios,the shared data is exceptionally sensitive.However,as MTCDs lack inherent security measures,external physical safeguards are not always feasible since these devices are meant to function remotely and autonomously.

    Moreover,securing data and devices becomes challenging due to various factors,including limited connectivity,harsh environmental conditions,restricted physical access,power constraints,and limited maintenance opportunities.MTCDs deployed in remote locations often suffer from brittle network connectivity,which may compromise real-time communication with security infrastructure.As a result,security updates,patches,and monitoring activities are delayed,which increases devices’vulnerability to emerging security threats.Harsh environmental conditions,temperature variations,and exposure to dust or moisture harm the physical integrity of MTCDs,which causes hardware degradation and compromises the device’s ability to enforce security measures.Restricted physical access to MTCDs makes physical security measures challenging to implement.It also raises concerns about unauthorized access,tampering,or theft of devices.MTCDs deployed in remote environments usually lack reliable power sources and rely on batteries.Insufficient power can lead to unexpected device shutdowns,leaving systems unprotected during critical times.Finally,there are limited maintenance and update opportunities for MTCDs in remote or harsh environments,which results in outdated firmware or security protocols that may expose devices to known vulnerabilities.

    The threats mentioned above may be mitigated by carefully implementing device,data,and user authentication mechanisms.A robust device authentication mechanism involves a secure device provisioning through device identity verification during device enrollment on the network,a mutual authentication mechanism to enforce mutual authentication between devices and network servers,and multi-factor authentication by requiring multiple credentials,e.g.,digital certificates,hardware tokens,or passwords for device access.Data authentication can be implemented through digital signatures,message authentication codes,and hash functions.User authentication can be implemented through strong password policies,role-based access control,and biometric authentication.

    Consequently,these devices rely solely on software-based security measures.Owing to their limited computational and memory capacities,conventional Internet security protocols do not always apply to these IoTs [3].Effectively operating MTC communication necessitates a network of MTC-based devices.This network may,in turn,consist of several connected devices,and every device must be trusted to ensure security.This is achieved via authentication,where every device in the network must authenticate itself so that the data is considered trusted.

    This review is based on authentication techniques proposed in different applications for securing MTC devices under the IoT (Internet of Things) framework.This article represents a thorough review of the authentication of MTC devices in M2M (machine-to-machine) communication in three categories,i.e.,local,group,andfactor-basedauthentication techniques,where several related techniques are analyzed regarding performance efficiency,security,and adaptability.

    1.1 Contribution of Research

    This work offers a thorough idea to the researcher related to the perceptual layer security requirements and features in M2M communication networks,as MTC devices are best suited for efficient performance in the perceptual layer.Moreover,the work categorizes authentication schemes into three categories and compares different authentication schemes.Furthermore,the authentication taxonomy in the last section offers a thorough understanding of authentication features and processes in the recent IoT security developments.

    The paper is organized in the following manner.Section 2 represents Authentication in MTC devices,including perception layer security threats and requirements.Section 3 offers comparative analysis features adopted to analyze the categorized authentication schemes in the M2M communication network.Section 3 highlights issues and challenges.The paper is concluded in Section 5.

    2 Machine-Type Communication Devices

    MTC devices are autonomous IoT devices whose core functionality is to operate in remote areas in M2M communication networks.These devices are mostly battery-powered that collect,process,and transmit data to central nodes or gateways to be stored on the cloud for further processes[4].

    2.1 MTC Device Layers

    The functions of these devices are distributed in four layers,as summarized in Table 1.

    Table 1: Generic four-layer architecture of IoT

    2.2 Security Features in the Perception Layer of MTC Devices

    Research offered by[4]and[9]shows that the perceptual layer security can be separated into two categories,i.e.,security and technological challenges.The technological category focuses on challenges due to the dynamic topologies of MTC devices and the ubiquitous behavior of IoT and M2M network applications.It includes areas such as energy,power,distributed features,and risks.Whereas,security challenges primarily aim to address solutions and weaknesses in end-to-end encryption,data integrity,data confidentiality,and scalability to ensure authentication between these devices[9].Moreover,the authentication scheme is chosen considering the nature of communication within the network and the type of business application required,and with certain cryptosystem techniques.

    Table 2 represents perceptual layer security features for MTC devices in the M2M communication network.Each perceptual layer security feature enhances resilience against the perceptual layer security threats,as shown in Table 3.The represented authentication schemes are tested for performance efficiency and verified for security proofs against several features,as shown in Table 4.

    Table 2: Perception layer security features in M2M communication

    Table 4: Comparative analysis tools and features used in M2M communication

    3 Authentication in MTC Devices

    Authentication is a software-based security technique used in different topologies.MTC devices form three types of authentications in M2M communication,i.e.,local,group-based,and hybrid(factor-based).In the local authentication,all devices authenticate within the connected network.Any other device outside the network cannot share the data.In comparison,group-based authentication is used for a large number of devices working in simultaneous prospects of applications.Several devices form a group using local authentication techniques and cluster single groups.These groups authenticate other groups,and data is shared.Such authentication processes usually occur in LTE(long-term evolution)/CDMA(code-division multiple access)and 3GPP(3rd Generation Partnership Project)-based network infrastructures.

    Moreover,in hybrid or factor-based authentication,M2M communication occurs between an end device,i.e.,MTC,and a gateway,making it two-factor authentication.The process of key sharing,encryption,and decryption is performed for both MTC and gateway.Similarly,three-factor authentication involves servers or clouds as the third tier of communication.In such a technique,servers and gateways must utilize similar distributed encrypted keys for authentication.Additionally,mutual authentication is an important part of authentication where data transmitting and receiving devices must mutually authenticate each other before sharing the actual data.

    3.1 Group-Based Authentication

    Such authentication protocols are used when a network consists of a large number of MTC devices.Single-device authentication is costly,and it includes extreme network overheads.Moreover,the area coverage is extremely large.Thus,numerous devices communicate simultaneously,so groupbased authentication is effective against network overheads [45].Standard encryption systems use either symmetric,asymmetric,or hybrid cryptographies.With extreme growth in wireless sensor networks[4],MTC devices are also introduced in LTE-A(long-term evolution-Advanced)networks,implementing 4G heterogeneous networks with low latency.LTE/LET-A networks tend to have a predefined authentication system between communication units for MTC network architecture,which was introduced by the 3GPP committee [2].The network comprises MME (mobile management entity)and HSS(home subscriber server).The architecture includes users or MTC devices and servers,whereas the user is outside the network domain.Users or MTC devices and servers communicate over an API (application programmable interface),as shown in Fig.2.Users or MTC devices must authenticate over the LTE/LTE-A network.In this regard,the EPS-AKA (evolved packet systembased authentication and key agreement)developed a packet delivery system for the 3GPP network with an extended version called EAP-AKA(extensible authentication protocol-authentication and key agreement)for the non-3GPP network over WLAN(wireless local area network)/WiMAX(worldwide interoperability for microwave access) was implemented for the objective of secure data transfer between MTC devices and server[46].

    Figure 2: Local authentication network structure based on[1]

    Several key agreeing protocols use the 3GPP network architecture.These protocols improve security and lessen network overheads.Jung et al.[47]devised congestion avoidance to prevent signaling congestion.In extension,Chen et al.[48]applied a similar grouping approach in G-AKA where the initiator device is verified by HSS,which then authorizes the MME entity.Still,it is susceptible to MiTM (man in the middle) and DoS (denial of service) threats.Lai et al.[49] proposed SE-AKA(secure and efficient authentication and key agreement),where a novel asymmetric method of encoding keys was introduced,which later proved less usefulvs.signaling congestion.Jiang et al.[50]proposed EG-AKA (EAP-based group authentication and key agreement) to validate a local group of MTC devices.Still,the procedure is susceptible to MiTM,DoS,and re-directional threats.The MTC-AKA(machine-type communication authentication and key agreement) by Lai et al.[51] first used fully authenticated MTC devices with HSS,which authenticated reaming MTC devices through a group temporary key—however,the protocol suffered from security attacks.Choi et al.[52] endorsed the GROUP-AKA protocol to alleviate signaling congestion where groups of devices were validated with reduced signaling congestion.Devices could easily join and leave the group but lacked in device privacy preservation.Cao et al.[53]developed GBAAM-AKA(group-based access authentication for MTCauthentication and key agreement) to address the privacy preservation challenge.Moreover,Highlevel computation overheads were created as GBAAM-AKA followed an asymmetric cryptosystem.Fu et al.[54]introduced the PRIVACY-AKA protocol that creates pseudo-identity via elliptic curve cryptography through group leaders,where the group leaders receive MAC from devices and produce an accumulated MAC.The scheme responds to primary security risk without key secrecy and produces network overheads.Lai et al.[55] recommended GLARM-AKA (group lightweight authentication scheme for resource-constrained M2M-authentication and key agreement),which is lightweight and produces less network signaling overheads in comparison to primitive AKA protocols but it fails due to unlink-capability.The protocol deteriorates from newly joining and old devices leaving the system,which gives a chance to DoS assaults and privacy issues.Li et al.[38]improved GR-AKA’s unlinkability by endorsing a dynamic policy in LTE-A.However,strong cryptography resulted in heavy bandwidth consumption.Yao et al.[56]proposed GBS-AKA(group-based secure authentication and key agreement)and improved overhead and bandwidth consumption but failed to incorporate privacy preservation.

    Table 5 shows the group-based techniques that attempt to improve performance and adapt resilience against several security threats.Each work achieves a specific goal but lacks a thorough security-resilient mutual authentication scheme.

    Table 5: Summary of discussed group-based authentication schemes

    3.2 Local Authentication

    Local authentication is adopted when devices are near or in close vicinity.It requires user equipment to be within reach of MTC devices and does not require Internet or remote access.For example,for patients’clinical tests via sensors,the patient has to be available within the medical facility.Similarly,for sensitive laboratories,the door has to be opened by the user through RFID(radio frequency identification),thus accessing the facilities only,and smart parking where parking space is allocated to drivers within the parking station[23].In such circumstances,local authentication is more suitable and less costly regarding security and operational feasibility.However,unlike the GBA schemes,the communication protocols are less robust than those of 4G or mobile networks.This is why operating local authentication-based systems is challenging[1],especially when numerous users are authenticated simultaneously.Local authentication is usually designed for access control systems where users have different privileges,such as two users with different hierarchies.One is granted full access,while the other is granted half access for certain system features.The local authentication network consists of M2M devices,a gateway,and communication channels where gateways can transfer data over the Internet and the cloud.During the transmission,the M2M device encounters three major challenges.

    ? All devices must be authenticated to ensure secure data transfer because an impersonator can easily use fake nodes to monitor data transmission and obtain crucial information related to security.In contrast,with malicious nodes,the integrity of the entire network could be at risk.To authenticate both,a mutual authentication scheme is mostly adopted [57].Mutual authentication in MTC devices happens with encrypted shared keys.These keys are generated via symmetric or asymmetric crypto-mechanism with the cost of complex MAC and high computation power.

    ? All M2M communicating devices must ensure user privacy through anonymity.It is very crucial to ensure secrecy.During communication,MTC devices must not share any data relating to the data sender’s identity [58].If such privacy is neglected,logs generated by devices may reveal sensitive information related to who,when,and where access was granted to a particular privileged user.Furthermore,a service provider could also reveal the information of all M2M devices’access control operations.That is why anonymity will ensure that the information is kept hidden from other devices[26,59].

    ? Since MTC devices possess low computational power,limited memory,and heterogeneity with dynamic topology,computational complexity must be designed so that 8-16-bit microprocessors can process smoothly.These limitations make the authentication process more difficult as traditional robust authentication methods may strain the limited resources.Complex encryption algorithm implementation may result in higher processing demands,which could impair the device responsiveness and performance.

    Thus,it becomes essential to strike a balance between the requirement to save resources and strong security measures in order to guarantee that the authentication process stays efficient without unnecessarily straining the limited capabilities of MTCDs.Lightweight cryptography is also adopted to ensure privacy and mutual authentication.However,achieving all basic security features with efficiency is an ongoing research.

    Table 6 provides a summary of local authentication schemes according to Table 4.Local authentication and access scheme in WSN (wireless sensor network) using a public key with a symmetric cryptosystem for healthcare applications was proposed by Le et al.[60].Sensor nodes’task was to perform symmetric-key encryption computation and were verified online by third-party coordinate nodes.Shen[61]designed a user access control scheme based on a symmetric encryption system using Merkle tree and hash chain functions.The scheme reduced space complexity but did not achieve basic security features.Due to compromised user anonymity,a user’s sensitive information is exposed during communication.Wang et al.[62]introduced hybrid authentication by merging local and remote access control system features and incorporating ECC (elliptical curve cryptography) lightweight cryptography [63].However,the sensor authentication property is ignored and thus is vulnerable to impersonator/fake nodes.Zhang et al.[36] proposed RSA (Rivest-Shamir-Adleman)-based blind signatures as tokens for users to obtain access rights.The proposed mechanism ensured user privacy and sensor node anonymity.He et al.[35] highlighted that Zhang’s mechanism did not account for double-spending,resulting in heavy memory consumption and network overheads.He et al.introduced an improved mechanism version by adding ring signatures based on elliptic curve cryptography to achieve user anonymity and reduce memory and communication overheads.The technique was also vulnerable to MiTM attacks using the ECDH (elliptic curve Deffie-Hellman) algorithm [63].He et al.further attempted to improve the scheme by adding node accountability[64]to implement network-based rules.Sophisticated privacy-ensuring mechanisms resulted in high computation costs and memory consumption,which MTC devices cannot afford.Similar related works [60–62] aimed to compensate operations in resource-constrained MTC devices by ignoring privacy.Both schemes[60,62]are based on certificate-based authentication.Users can identify logs and logging activities by verifying their certificates.On the contrary,references [36,64] required the MTC devices to execute complex computation for acheivement of privacy.Furthermore,references[35,36],and[61,62]did not incorporate device authentication properly and lacked in achieving basic security features.Meanwhile,computational tasks are offloaded to another powerful sever to mitigate MTC devices’computational and memory overheads while achieving privacy and efficiency.However,it is challenging as the whole network relies on the server for computations.Any delay in servers can result in increased latency and network losses.In[60],mutual authentication is carried out through the authority of coordinated nodes despite authenticating each node directly.However,the user cannot access sensor nodes when controlled by coordinate nodes if coordinate nodes face any malfunction.Cai et al.[1] proposed a scheme that improve resource management for resource-constrained MTC devices inclduing user anonymity where computation is transferred to third part server which authenticates all devices via pre-shared keys.However,the mechanism could not perform well in noisy signals and did not register lost bytes in noisy signal losses.The proposed mechanism is also prone to failure if the authenticating server either loses the communincation ability or malfuncations.Moreover,there are security problems in the schemes where users’secrets are unprotected throughout the communication.He et al.[64] accomplished user privacy in contradiction to the service provider but their proposed method consumes more energy.Energy consumption increases with the increase of group member devices sharing similar access privileges.The schemes of [36] and [62] devour continuous energy for the MTC device for every user access operation despite unguaranteed user privacy.For the execution costs on MTC devices and users,proposed schemes[35,61,62]need to include a certificate generation and verification function,which necessitate exponentiation and inversion executions.Furthermore,associated with [35],LACS’s multiplication cost does not raise with the increase in group members.However,references[61,62]cost significantly more energy.

    Table 6: Summary of mentioned local authentication schemes

    3.3 Factor-Based Authentication

    Apart from group and local-based authentication,several other works have been proposed in securing MTC device communication with efficiency by adding additional unique parameters,including encryption,pre-shared unique identity keys,two factors such as user and device by using encrypted keys,three-factor such as user to device and device to the gateway,device signatures and implementing secure hash-functions.Each parameter is addressed to a particular environment and topological structure of the WSN network.Such authentication schemes are used for specific business applications requiring specific networks with user-controlled privileges.

    Table 7 summarizes hybrid and factor-based authentication schemes analyzed through features presented in Table 4.Das[65]proposed a two-factor user verification method for WSN by securing secret key risking,mimicking,and DoS attacks.Vaidya et al.[66] pointed out that such a scheme had some security flaws by not offering users to change passwords and shared authorization between the gateway,sensors,and nodes.Vaidya et al.brought up a strategy that proposed an improved method.However,the proposed method offered no defense against malicious insider and bruteforce attacks [67].Additionally,they proposed a scheme to counter such attacks by merging keys and XORing the results.However,the scheme could not withstand insider and disconnected secret key-guessing attacks.Reference [11] devised a simple architecture for mutual authentication by prioritizing low computational and lesser memory consumption.The scheme met low computation and less memory consumption criteria but lacked database-related security measures.Reference[13]proposed an improved AKA scheme specifically for M2M correspondences in 6LoWPAN (IPv6 over low-power wireless personal area networks) systems.To overcome the weaknesses referenced in AKAES (authentication and key agreeing encrypted system),a combination of cryptography is utilized for secure authentication and shared keys with thought of resource constraints at 6LoWPAN utilizing MTC devices.A handover ticket is produced for a mobile device(6LR)to accomplish quick authentication when performing handovers.Therefore,a full authentication process may be performed once the ticket is terminated.In addition,the proposition has a remarkable element of giving security backing to both static and portable devices in 6LoWPAN systems.Reference [68] proposed model of authentication using IBC(Identity Based Cryptography)known as AIBCwKE(authentication via identity-based cryptography without key escrow),where all devices were assigned encrypted identities via ECC cryptography,excluding key agreeing mechanisms by third parties.The MSP (Machine to Machine Service Provider)was the main connectivity server and established communication between two entities (device,gateway,and user) using a public key.Reference [69] proposed three-factor authentication to target user anonymity,an extension to [70] and [71].Jiang et al.[70] incorporated two-factor-based ECC authentication where a user would log in,authenticate,and share data.Only the shared was encrypted by lightweight cryptography based on ECC,thus achieving data integrity and a low resource-occupying mechanism,an extension of [71].Choi et al.’s work [71] proposed an enhanced scheme to improve its predecessor’s ECC techniques for user anonymity.The proposed mechanism improved authentication and disabled security faults through BAN logic.Reference[69]discussed security flaws in[70]and pointed to a lack of user-friendliness,password updating method,and missing function to detect unauthorized login.

    Table 7: Summary of discussed factor-based schemes in M2M communicating networks

    4 Issues and Challenges

    The evidence from Tables 5–7 suggests that the methods with good encryptions successfully achieved data integrity.Good encryption on data transmission ensured countering the MiTM attacks and data spoofing attacks.Meanwhile,the schemes with mutual authentication and good encrypted keys achieved user and device privacy.Schemes with only key encryption techniques are liable to MiTM and impersonator attacks because an impersonator can guess that the encrypted MACs are predominantly keys,so it will be easier to retrieve secrets.However,to our knowledge,an efficient scheme with end-to-end encryption,encrypted keys,and mutual authentication has not been found in any of the mentioned authentication types.The two-layer encryption would prove robust against MiTM and spoofing attacks while ensuring user and device privacy,including authentication.On the contrary,efficient two-layer encryption for keys and end-to-end encryption would be challenging as it might produce network overheads and prove costly in computation and memory consumption.Achieving optimal security protocol for MTC devices is still challenging because many devices work simultaneously in one network.

    Our study elaborates on the weaknesses and strengths of current protocols and schemes used to counter certain challenges in communication,as discussed in the following.Fig.3 shows a taxonomy of authentication schemes used in M2M communication.

    Figure 3: Taxonomy of authentication in M2M communication

    ? Groups-based authentication suits a network of large amounts of devices that require remote access via the Internet or use cloud services for data storage and access control.Such schemes require 3GPP or 4G infrastructure that provides seamless connectivity for remote users and mobility for mobile devices.However,MiTM and spoofing attacks are yet to be encountered efficiently in remote areas.

    ? Local authentication schemes better counter MiTM and Spoofing attacks due to easy access in sensitive and crucial business applications,which must ensure user privacy.That is why security features must be addressed,assuming risky threat models.However,efficient computational power and memory consumption are still lacking in the proposed schemes in Table 5.

    ? With no 3GPP or 4G infrastructure,several devices must communicate simultaneously via a well-organized network that ensures user privacy and mutual authentication.However,forward and back security is still challenging for such big networks.The risk extends to the whole network if a single device faces vulnerability.A complete collision detection text must be taken out for all devices in the network,which is time-consuming,costly,and highly complex.

    ? No scheme mentioned in this article addressed data availability during communication failure scenarios.If the network faces communication failure for any reason,the devices will also lose functionality and data.A system enabling such devices to work even during communication failure is still challenging.

    ? There is a gap in achieving a standard authentication model for a general authentication scheme that can address all general M2M communication applications.

    5 Conclusion

    In conclusion,establishing fool-proof security in the domain of Internet of Things(IoT)remains a formidable challenge.Authentication,as a fundamental component of security provisions,plays a crucial role in ensuring the integrity and confidentiality of Machine-Type Communication (MTC)devices.Our study delves into various authentication techniques aimed at achieving optimal performance efficiency and security while minimizing associated costs.The investigation sheds light on persistent challenges and outlines potential avenues for enhancing security in the future.Despite the advancements in two-layer encryption,which ensures user and device privacy and guards against spoofing and Man-in-the-Middle (MiTM) attacks,it comes with noticeable computational and network overheads.Group-based authentication emerges as a suitable solution for large networks,but its efficacy requires efficient countermeasures in remote areas.Local authentication schemes effectively address MiTM and spoofing attacks but encounter computational power challenges,while the unresolved issue of data availability during communication failures persists.

    This study can further benefit from state-of-the-art techniques in the evolving landscape of IoT security,such as edge and fog computing,biometric authentication,blockchain-based authentication,risk-based authentication,machine learning,and anomaly detection.Furthermore,quantum-resistant authentication can be used to cope up with dynamic nature of IoT security.In this context,some prominent works on state-of-the-art concepts in IoT security can be used as a basis for further research,such as [72–74],that emphasizes who has described the security implications of quantum cryptography,artificial intelligence and lightweight peer-to-peer authentication.Additionaly,the research of Bonandrini et al.[75] has also contributed to anomaly detection in IoT networks,while researches in[76,77]proposed a Blockchain-based scheme for authentication and cloud based security in IoT environments.Furthermore,a secure authentication and protocol for M2M communication by Thammarat et al.[78] and the research of Zareen et al.[73] on authentication and authorization of IoT devices using AI can also be further research direction.These works further propose innovative approaches to address the multifaceted challenges in IoT security.As the field continues to evolve,embracing these trends and leveraging their unique contributions will be pivotal in establishing a standardized authentication model for general M2M communication applications.

    Acknowledgement:The authors acknowledge the gracious support provided by the King Faisal University,Saudi Arabia.

    Funding Statement:This work was funded by the Deanship of Scientific Research,Vice Presidency for Graduate Studies and Scientific Research,King Faisal University,Saudi Arabia (Grant No.GRANT5,208).

    Author Contributions:The authors worked together on different parts of the research.S.U.started with problem formulation and conducted initial studies.S.U.B.performed problem analysis and critical review of related studies.M.I.checked for mistakes and planned research methodology.Q.M.I.and A.M.critically analyzed and interpreted the results.M.A.S.analyzed the research challenges,while M.A.R.and I.K.proposed potential future works.A.H.critically reviewed and revised the draft.S.I.,Y.G.,and K.H.helped with the manuscript write-up.

    Availability of Data and Materials:All data used in this research are available from the corresponding authors upon request.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    丁香六月欧美| 国产精品免费大片| av网站在线播放免费| 久久 成人 亚洲| 国产亚洲一区二区精品| 亚洲精品成人av观看孕妇| 国产日韩欧美在线精品| 男女免费视频国产| 欧美日韩视频精品一区| 最近最新中文字幕大全电影3 | 黑人欧美特级aaaaaa片| 黑人巨大精品欧美一区二区mp4| 搡老岳熟女国产| 精品久久久久久久毛片微露脸| 亚洲av国产av综合av卡| 777米奇影视久久| 亚洲欧美一区二区三区久久| 大型黄色视频在线免费观看| 90打野战视频偷拍视频| 99精品久久久久人妻精品| 精品第一国产精品| 另类精品久久| 国产免费av片在线观看野外av| 久久人妻熟女aⅴ| 久久久精品国产亚洲av高清涩受| 精品卡一卡二卡四卡免费| 老汉色∧v一级毛片| 亚洲精品一二三| 久久久久久久久久久久大奶| 男人操女人黄网站| 欧美黄色片欧美黄色片| 成人国语在线视频| 最近最新中文字幕大全免费视频| 亚洲熟妇熟女久久| 午夜激情av网站| 激情在线观看视频在线高清 | 精品少妇内射三级| 纯流量卡能插随身wifi吗| 男女床上黄色一级片免费看| 久久久国产成人免费| 两个人看的免费小视频| 免费高清在线观看日韩| 久久精品亚洲av国产电影网| xxxhd国产人妻xxx| 欧美+亚洲+日韩+国产| 欧美激情极品国产一区二区三区| 国产精品秋霞免费鲁丝片| 9色porny在线观看| 蜜桃国产av成人99| 成人免费观看视频高清| 国产成人免费观看mmmm| 在线 av 中文字幕| 他把我摸到了高潮在线观看 | av免费在线观看网站| 日韩 欧美 亚洲 中文字幕| 亚洲七黄色美女视频| e午夜精品久久久久久久| 亚洲av片天天在线观看| 丁香六月天网| 99国产精品一区二区蜜桃av | 又黄又粗又硬又大视频| 男女无遮挡免费网站观看| 丝袜美腿诱惑在线| 国产成人一区二区三区免费视频网站| 欧美久久黑人一区二区| 成人av一区二区三区在线看| 午夜福利在线免费观看网站| 少妇的丰满在线观看| 亚洲专区字幕在线| 久久久精品免费免费高清| 电影成人av| 午夜成年电影在线免费观看| 精品一区二区三区视频在线观看免费 | 宅男免费午夜| 国产欧美日韩一区二区精品| 国产成人精品久久二区二区免费| 老熟女久久久| 最近最新中文字幕大全免费视频| 成人18禁高潮啪啪吃奶动态图| 日韩一区二区三区影片| 亚洲精品一二三| 中文欧美无线码| 黄色a级毛片大全视频| 热re99久久精品国产66热6| 一本一本久久a久久精品综合妖精| 亚洲五月婷婷丁香| 男男h啪啪无遮挡| 韩国精品一区二区三区| 男女免费视频国产| 国产成人av激情在线播放| 久久婷婷成人综合色麻豆| 捣出白浆h1v1| 两人在一起打扑克的视频| 一本综合久久免费| 午夜福利一区二区在线看| 中国美女看黄片| 亚洲情色 制服丝袜| 国产无遮挡羞羞视频在线观看| 精品少妇黑人巨大在线播放| 免费不卡黄色视频| 黄色视频在线播放观看不卡| 一二三四社区在线视频社区8| 亚洲一卡2卡3卡4卡5卡精品中文| 午夜福利影视在线免费观看| 国产淫语在线视频| 欧美日韩视频精品一区| 中文字幕精品免费在线观看视频| 他把我摸到了高潮在线观看 | 国产亚洲精品第一综合不卡| 中亚洲国语对白在线视频| 欧美精品av麻豆av| 伊人久久大香线蕉亚洲五| 日韩视频一区二区在线观看| 午夜久久久在线观看| 麻豆成人av在线观看| 99国产精品免费福利视频| 亚洲一卡2卡3卡4卡5卡精品中文| 在线十欧美十亚洲十日本专区| 国产淫语在线视频| 欧美日韩福利视频一区二区| 国产精品熟女久久久久浪| av欧美777| 视频在线观看一区二区三区| 人人澡人人妻人| 久久久久久人人人人人| 黑丝袜美女国产一区| 狂野欧美激情性xxxx| 美女国产高潮福利片在线看| www.999成人在线观看| 日韩有码中文字幕| 在线观看舔阴道视频| 亚洲第一av免费看| 69精品国产乱码久久久| 欧美国产精品va在线观看不卡| h视频一区二区三区| 高清毛片免费观看视频网站 | 午夜老司机福利片| 成年人午夜在线观看视频| 国产免费av片在线观看野外av| 欧美成狂野欧美在线观看| 黄色毛片三级朝国网站| 丁香欧美五月| 中文字幕人妻熟女乱码| 欧美国产精品va在线观看不卡| 国产精品国产av在线观看| 成人手机av| 91精品国产国语对白视频| 精品亚洲成国产av| 久久久久国内视频| 亚洲国产欧美网| 亚洲欧美色中文字幕在线| 一级片免费观看大全| 亚洲情色 制服丝袜| 国产深夜福利视频在线观看| 一夜夜www| 色尼玛亚洲综合影院| 少妇粗大呻吟视频| 黄频高清免费视频| 国产精品一区二区免费欧美| 午夜福利视频在线观看免费| 欧美亚洲 丝袜 人妻 在线| 亚洲色图综合在线观看| 久久国产精品男人的天堂亚洲| 午夜福利在线观看吧| 久久99热这里只频精品6学生| av天堂在线播放| 国产成人精品无人区| 免费久久久久久久精品成人欧美视频| 99久久99久久久精品蜜桃| 高潮久久久久久久久久久不卡| 亚洲熟女精品中文字幕| 午夜久久久在线观看| 高清欧美精品videossex| 国产男靠女视频免费网站| 露出奶头的视频| 成人三级做爰电影| 夜夜骑夜夜射夜夜干| 在线观看免费视频日本深夜| 韩国精品一区二区三区| 久久久欧美国产精品| 80岁老熟妇乱子伦牲交| 国产成人精品在线电影| 欧美日韩亚洲综合一区二区三区_| 69av精品久久久久久 | 色婷婷久久久亚洲欧美| 国产精品久久久久久精品古装| 91成人精品电影| 一区福利在线观看| 女人久久www免费人成看片| 18在线观看网站| 在线av久久热| 淫妇啪啪啪对白视频| 亚洲精品一卡2卡三卡4卡5卡| 午夜精品国产一区二区电影| 久久久久久久精品吃奶| 午夜福利视频精品| 一区福利在线观看| 久久久久久亚洲精品国产蜜桃av| 国产一区二区三区视频了| 国产有黄有色有爽视频| 中文字幕av电影在线播放| 国产精品久久久av美女十八| 国产熟女午夜一区二区三区| 国产精品一区二区精品视频观看| 欧美激情高清一区二区三区| 一级毛片女人18水好多| 一区二区日韩欧美中文字幕| 成人国语在线视频| 亚洲精品国产区一区二| 中文字幕另类日韩欧美亚洲嫩草| 脱女人内裤的视频| 99re在线观看精品视频| 精品国产一区二区久久| 激情视频va一区二区三区| 大陆偷拍与自拍| 国产人伦9x9x在线观看| 亚洲成人免费av在线播放| 青草久久国产| 国产精品98久久久久久宅男小说| 99精国产麻豆久久婷婷| 中文字幕av电影在线播放| 久久亚洲精品不卡| 两人在一起打扑克的视频| 一区二区三区激情视频| 国产精品 国内视频| 国产免费视频播放在线视频| 18禁国产床啪视频网站| 亚洲综合色网址| 亚洲精品国产区一区二| 又大又爽又粗| 岛国在线观看网站| 老司机影院毛片| 欧美精品av麻豆av| 国产精品久久久av美女十八| 大型av网站在线播放| 国产精品亚洲av一区麻豆| 久久99热这里只频精品6学生| 少妇粗大呻吟视频| 精品国产一区二区三区久久久樱花| 99香蕉大伊视频| av网站在线播放免费| 亚洲精品在线美女| 亚洲av第一区精品v没综合| 国产精品电影一区二区三区 | 黄频高清免费视频| 亚洲午夜理论影院| 久久av网站| 久久精品国产99精品国产亚洲性色 | 精品国产超薄肉色丝袜足j| 性色av乱码一区二区三区2| av国产精品久久久久影院| 无遮挡黄片免费观看| 国产精品成人在线| 一二三四在线观看免费中文在| 一个人免费在线观看的高清视频| 天堂8中文在线网| 丁香欧美五月| 亚洲免费av在线视频| 激情视频va一区二区三区| 国产成人精品久久二区二区91| 丁香六月欧美| 老汉色av国产亚洲站长工具| 久久ye,这里只有精品| 国产男靠女视频免费网站| 国产av又大| 老熟妇乱子伦视频在线观看| 男女免费视频国产| 女人爽到高潮嗷嗷叫在线视频| 午夜福利,免费看| 高清av免费在线| 韩国精品一区二区三区| 女警被强在线播放| 欧美日韩亚洲高清精品| 欧美日韩成人在线一区二区| 精品福利观看| 国产免费福利视频在线观看| 搡老熟女国产l中国老女人| 一二三四社区在线视频社区8| 国产精品欧美亚洲77777| 丝袜喷水一区| 最新在线观看一区二区三区| 十八禁高潮呻吟视频| 欧美成狂野欧美在线观看| 国产精品98久久久久久宅男小说| 亚洲国产精品一区二区三区在线| 中文字幕精品免费在线观看视频| 丝袜美腿诱惑在线| 91九色精品人成在线观看| 亚洲成av片中文字幕在线观看| 一级片'在线观看视频| 老熟女久久久| 久久久国产成人免费| 一边摸一边做爽爽视频免费| 男女下面插进去视频免费观看| 久久精品国产综合久久久| 亚洲精品美女久久久久99蜜臀| 法律面前人人平等表现在哪些方面| 午夜福利视频在线观看免费| 成人国产av品久久久| 亚洲色图 男人天堂 中文字幕| 成年版毛片免费区| 在线看a的网站| 在线观看舔阴道视频| 大香蕉久久网| 久久99热这里只频精品6学生| 1024香蕉在线观看| 久久午夜综合久久蜜桃| 宅男免费午夜| 丰满迷人的少妇在线观看| 人妻 亚洲 视频| 一本色道久久久久久精品综合| 三上悠亚av全集在线观看| 超色免费av| 激情在线观看视频在线高清 | 老司机午夜福利在线观看视频 | 欧美成狂野欧美在线观看| 麻豆成人av在线观看| 精品福利永久在线观看| 老司机在亚洲福利影院| 69av精品久久久久久 | 欧美亚洲 丝袜 人妻 在线| 777久久人妻少妇嫩草av网站| 国产亚洲精品久久久久5区| 王馨瑶露胸无遮挡在线观看| 日韩熟女老妇一区二区性免费视频| 日本av手机在线免费观看| h视频一区二区三区| 久久人人爽av亚洲精品天堂| 老汉色∧v一级毛片| 国产有黄有色有爽视频| 欧美日韩亚洲国产一区二区在线观看 | 在线天堂中文资源库| 别揉我奶头~嗯~啊~动态视频| 男男h啪啪无遮挡| 色在线成人网| 啪啪无遮挡十八禁网站| av天堂久久9| 国产深夜福利视频在线观看| 天天添夜夜摸| 国产精品免费大片| 国产精品熟女久久久久浪| av在线播放免费不卡| 日本av免费视频播放| 大片免费播放器 马上看| 国产日韩欧美在线精品| 天天添夜夜摸| 欧美黑人欧美精品刺激| tocl精华| 香蕉久久夜色| av视频免费观看在线观看| 一区在线观看完整版| 亚洲av成人一区二区三| 精品亚洲成a人片在线观看| 亚洲av日韩在线播放| 国产1区2区3区精品| 久久久久精品人妻al黑| 国产1区2区3区精品| 国产一区二区激情短视频| 国产av国产精品国产| 91精品三级在线观看| 久久国产精品人妻蜜桃| 国产欧美日韩精品亚洲av| 久久国产精品人妻蜜桃| 捣出白浆h1v1| 亚洲中文日韩欧美视频| 国产午夜精品久久久久久| 国精品久久久久久国模美| 十八禁网站免费在线| 欧美久久黑人一区二区| 亚洲熟妇熟女久久| 大片免费播放器 马上看| 人人妻人人澡人人爽人人夜夜| 国产成人精品久久二区二区免费| 99精国产麻豆久久婷婷| 久久精品亚洲熟妇少妇任你| 国产成人精品无人区| 激情在线观看视频在线高清 | 99热国产这里只有精品6| 飞空精品影院首页| 国产精品秋霞免费鲁丝片| 亚洲av成人不卡在线观看播放网| 性少妇av在线| 新久久久久国产一级毛片| 桃花免费在线播放| 精品国产一区二区三区四区第35| 久久久精品94久久精品| 亚洲男人天堂网一区| 久久热在线av| 国产在线视频一区二区| 精品卡一卡二卡四卡免费| 国产av精品麻豆| 丰满少妇做爰视频| 狠狠婷婷综合久久久久久88av| 夜夜骑夜夜射夜夜干| 亚洲av第一区精品v没综合| 国产老妇伦熟女老妇高清| 亚洲七黄色美女视频| 老熟妇乱子伦视频在线观看| 十八禁人妻一区二区| 亚洲熟女毛片儿| 大香蕉久久成人网| 成人av一区二区三区在线看| aaaaa片日本免费| 免费看a级黄色片| 国产97色在线日韩免费| 在线观看免费视频网站a站| 法律面前人人平等表现在哪些方面| 欧美变态另类bdsm刘玥| 久久热在线av| 女性生殖器流出的白浆| 91九色精品人成在线观看| 精品免费久久久久久久清纯 | 成年动漫av网址| www.精华液| 国产91精品成人一区二区三区 | 女性生殖器流出的白浆| 一本大道久久a久久精品| 免费观看人在逋| 美女福利国产在线| 亚洲欧美一区二区三区久久| 黄网站色视频无遮挡免费观看| 美女高潮到喷水免费观看| 久久久久久亚洲精品国产蜜桃av| 国产精品亚洲一级av第二区| 18禁美女被吸乳视频| 亚洲色图av天堂| 极品教师在线免费播放| 成年人午夜在线观看视频| 中文字幕另类日韩欧美亚洲嫩草| 国产精品99久久99久久久不卡| 色精品久久人妻99蜜桃| 黄色 视频免费看| 精品国产一区二区久久| 99re在线观看精品视频| 国产一区二区 视频在线| 老汉色av国产亚洲站长工具| 搡老熟女国产l中国老女人| 满18在线观看网站| 一区二区三区激情视频| 久久久精品国产亚洲av高清涩受| 午夜福利一区二区在线看| 亚洲精品国产一区二区精华液| 1024香蕉在线观看| 91精品国产国语对白视频| 日韩欧美免费精品| 水蜜桃什么品种好| 日本av免费视频播放| 欧美+亚洲+日韩+国产| 亚洲精品乱久久久久久| 国产不卡av网站在线观看| 免费在线观看日本一区| 中文字幕另类日韩欧美亚洲嫩草| 97人妻天天添夜夜摸| 亚洲人成电影观看| 久久久久久久国产电影| 18禁裸乳无遮挡动漫免费视频| 国产又色又爽无遮挡免费看| 精品一区二区三区av网在线观看 | 亚洲精品美女久久久久99蜜臀| 免费观看人在逋| 精品卡一卡二卡四卡免费| kizo精华| 法律面前人人平等表现在哪些方面| 无遮挡黄片免费观看| 视频在线观看一区二区三区| 日韩中文字幕视频在线看片| 久久久久久久国产电影| 后天国语完整版免费观看| 国产精品免费视频内射| 久久99一区二区三区| 国产视频一区二区在线看| 亚洲色图 男人天堂 中文字幕| 人人妻,人人澡人人爽秒播| 精品久久蜜臀av无| kizo精华| 精品卡一卡二卡四卡免费| 大型av网站在线播放| 精品一区二区三区视频在线观看免费 | 久久国产亚洲av麻豆专区| 亚洲人成77777在线视频| 成人亚洲精品一区在线观看| 又黄又粗又硬又大视频| 18在线观看网站| 亚洲全国av大片| 亚洲成国产人片在线观看| 久久精品aⅴ一区二区三区四区| 色视频在线一区二区三区| 俄罗斯特黄特色一大片| 国产精品亚洲一级av第二区| 精品一区二区三区四区五区乱码| 人妻 亚洲 视频| av国产精品久久久久影院| 久久人妻熟女aⅴ| 日韩一区二区三区影片| 性少妇av在线| 国产在线观看jvid| 91大片在线观看| 国产在线免费精品| 欧美精品啪啪一区二区三区| 大香蕉久久成人网| 在线观看人妻少妇| 正在播放国产对白刺激| 国产精品一区二区在线观看99| 9热在线视频观看99| 久久香蕉激情| 亚洲欧美色中文字幕在线| 久久热在线av| 久久人妻福利社区极品人妻图片| 侵犯人妻中文字幕一二三四区| 一进一出抽搐动态| 国产高清激情床上av| 一级毛片女人18水好多| 狠狠狠狠99中文字幕| 999久久久精品免费观看国产| 桃花免费在线播放| 欧美激情 高清一区二区三区| 久久精品国产综合久久久| 视频在线观看一区二区三区| 亚洲伊人色综图| 亚洲欧洲日产国产| 国产在线免费精品| 精品福利观看| 热99re8久久精品国产| 国产不卡一卡二| 亚洲欧美日韩高清在线视频 | 久久国产精品影院| 国产一区二区在线观看av| av视频免费观看在线观看| 99国产精品99久久久久| 99国产精品一区二区蜜桃av | 国产一区二区激情短视频| 一边摸一边抽搐一进一出视频| tocl精华| 美女午夜性视频免费| 黄色a级毛片大全视频| 黄频高清免费视频| 美女视频免费永久观看网站| 可以免费在线观看a视频的电影网站| 美女高潮喷水抽搐中文字幕| 欧美 亚洲 国产 日韩一| 日本av免费视频播放| 亚洲欧美色中文字幕在线| 午夜免费鲁丝| 高清黄色对白视频在线免费看| 欧美 日韩 精品 国产| 久久久国产一区二区| 一二三四社区在线视频社区8| 免费日韩欧美在线观看| 亚洲色图 男人天堂 中文字幕| 免费少妇av软件| 午夜免费鲁丝| 人成视频在线观看免费观看| 久久久久久人人人人人| 2018国产大陆天天弄谢| 久久精品人人爽人人爽视色| 亚洲精品一卡2卡三卡4卡5卡| 日本wwww免费看| 欧美变态另类bdsm刘玥| 天天躁日日躁夜夜躁夜夜| 日韩大码丰满熟妇| 精品人妻1区二区| 久久热在线av| 在线看a的网站| 18禁观看日本| 正在播放国产对白刺激| 欧美激情高清一区二区三区| 美女视频免费永久观看网站| 亚洲国产中文字幕在线视频| 亚洲av电影在线进入| 亚洲三区欧美一区| 欧美一级毛片孕妇| 99在线人妻在线中文字幕 | 少妇被粗大的猛进出69影院| 咕卡用的链子| 欧美日韩视频精品一区| av欧美777| 国产成人免费无遮挡视频| 老鸭窝网址在线观看| 日韩制服丝袜自拍偷拍| 久久国产精品人妻蜜桃| 久久精品国产亚洲av高清一级| 日韩免费av在线播放| 国产高清videossex| 大陆偷拍与自拍| 不卡一级毛片| 欧美中文综合在线视频| 91成年电影在线观看| 国产亚洲一区二区精品| 久久久国产一区二区| 精品久久久久久久毛片微露脸| 丰满饥渴人妻一区二区三| 成人三级做爰电影| 90打野战视频偷拍视频| 在线观看www视频免费| 欧美日韩亚洲国产一区二区在线观看 | 久久久国产欧美日韩av| 青青草视频在线视频观看| 天天操日日干夜夜撸| 久久久久久久大尺度免费视频| 亚洲国产av影院在线观看| 欧美在线黄色| 国产精品偷伦视频观看了| 黄色毛片三级朝国网站| 精品国产一区二区三区久久久樱花| 亚洲色图av天堂| 国产av又大| 天天躁狠狠躁夜夜躁狠狠躁| 国产精品一区二区在线不卡| 天堂动漫精品| 在线观看舔阴道视频| 国产精品 国内视频| 亚洲精品中文字幕在线视频| aaaaa片日本免费| 精品视频人人做人人爽| 国产一区二区 视频在线|