Comparison on resilience and energy efficiency of authentication schemes in IoT networks
Network security is one of the primary concerns when deploying IoT applications. A proper authentication scheme can strengthen network security and resilience against malicious attacks. The quantitative comparison among authentication schemes is rarely found. Thus, it is difficult to choose the appr...
Saved in:
Published in: | Expert systems |
---|---|
Main Authors: | , |
Format: | Journal Article |
Language: | English |
Published: |
11-04-2024
|
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Network security is one of the primary concerns when deploying IoT applications. A proper authentication scheme can strengthen network security and resilience against malicious attacks. The quantitative comparison among authentication schemes is rarely found. Thus, it is difficult to choose the appropriate authentication scheme objectively. This paper presents a quantitative comparison of three authentication schemes, including blockchain‐based authentication, a widely discussed new approach for IoT security. This paper focuses on network‐level simulation instead of the protocol, providing a different angle when evaluating an authentication scheme. The simulations include five common topologies in IoT networks under five different attack strategies. The results show that the blockchain‐based scheme has the most substantial resilience compared to PKI‐based and PSK methods, while the computational cost is 1% less than the PKI‐based method. In addition, the PSK method is most energy efficient as its computational cost is only around 1% of PKI‐based and blockchain‐based methods. |
---|---|
ISSN: | 0266-4720 1468-0394 |
DOI: | 10.1111/exsy.13603 |