Researches about Security User Anthentication System of Internet of Things: Comparison Recent Schemes

Jiwei Leng


Internet of Things(IoT) is a new kind of high technology which has significant meaning in many ares such as industry and military. The popularity of the technology bring a lot of convenience for people. However, network attacks are huge threats of IoT. Since the features of IoT, traditional cyber security schemes are not suitable for modern IoT applying occasions. Throughout this article, the author review IoT basic knowledge and IoT security protocols in recently years. Particularly, choosing two papers which focus on user authentication of sensors to compare and analyse their core indexes. This paper provide useful information for IoT security beginner and point out future changes.


Internet of Things(IoT); Radio Frequency Identification(RFID); Intelligent Device; Wireless Sensor Networks(WSNs); Security; Gateway (GWN); Sensor; Encryption; Authentication; Server; Encryption; Decryption; Authentication; Server; Node; Hash Algorithm

Full Text:


Included Database


Yang L and Li DX, “Internet of Things (IoT) Cybersecurity Research:

A Review of Current Research Topics”, IEEE trans, IEEE internet of things journal, vol. 6, no. 2, pp. 2103-2115, 2019.

Mojtaba A, Mohammad HT and Alireza J, “Secure ticket-based authentication method for IoT applications”, Elsevier, Digital Communications and Networks, 2021.

Nishant S, Parveen SH, Rahul S, Shriniwas, “Secure Hash Authentication in IoT based Applications”, Elsevier, Global Transitions Proceedings, vol. 2, no. 2021, pp. 84-90, 2021.

Sahil Garg, Member, Kuljeet Kaur, Georges Kaddoum and Kim-Kwang Raymond Choo, “Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0”, IEEE trans, IEEE internet of things journal, vol. 7, no. 5, pp. 4598-4606, 2020.

PatilIqbal H. Sarker, Asif Irshad Khan, Yoosef B. Abushark,Fawaz Alsolami, “Internet of Things (IoT) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions and Research Directions” , Springer, Mobile Networks and Applications, 2022.

Foroozan GD and Masoumeh S, “A New Lightweight User Authentication and Key Agreement Scheme for WSN”, Springer, Wireless Personal Communications, pp. 3247-3269, 2020.

Anup KM, Ashok KD, Sajjad SJ, Debasis G, “Secure user authentication mechanism for IoT-enabled Wireless Sensor Networks based on multiple Bloom filters”, Elsevier, Journal of Systems Architecture, 2021.

Jan L, Amir MR, Saqib Ali, et al, “BCmECC: A Lightweight Blockchain-Based Authentication and Key Agreement Protocol for Internet of Things”, MDPI, mathematics, 2021.



  • There are currently no refbacks.

Copyright (c) 2022 Jiwei Leng

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.