Skip to main content

A Bibliometric Analysis of Authentication and Access Control in IoT Devices

  • Chapter
  • First Online:
Handbook of Big Data and IoT Security

Abstract

In order to be considered secure, the devices which make up the Internet of Things (IoT) need access control and authentication methods which are resilient against a wide range of attacks. This paper provides a bibliometric analysis of available academic research papers in this area from 2008 to 2017. We used a dataset of 906 academic papers and analysed the most productive countries, journals, authors and research institutions, as well as looking at the most common research areas, keywords and the most highly cited articles. We then looked at the trends in each country’s production finding that overall production is increasing as well as the number of countries contributing. We found that the countries of India, South Korea and USA are rising in their proportional contribution to the dataset whereas the established leader in production, China, is decreasing in dominance. Trends in keyword use showed that the proportion of research relating to Wireless Sensor Networks and RFID technology is decreasing, while the proportion of research into the area of IoT privacy is growing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. G. Epiphaniou, P. Karadimas, D. K. Ben Ismail, H. Al-Khateeb, A. Dehghantanha, and K.-K. R. Choo, “Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks,” IEEE Internet Things J., pp. 1–1, 2017.

    Google Scholar 

  2. M. Conti, A. Dehghantanha, K. Franke, and S. Watson, “Internet of Things security and forensics: Challenges and opportunities,” Futur. Gener. Comput. Syst., vol. 78, pp. 544–546, Jan. 2018.

    Google Scholar 

  3. S. Li, L. Da Xu, and S. Zhao, “5G Internet of Things: A Survey,” J. Ind. Inf. Integr., p., 2018.

    Google Scholar 

  4. Y.-Y. Teing, D. Ali, K. Choo, M. T. Abdullah, and Z. Muda, “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study,” IEEE Trans. Sustain. Comput., pp. 1–1, 2017.

    Google Scholar 

  5. I. Yaqoob et al., “The rise of ransomware and emerging security challenges in the Internet of Things,” Comput. Networks, vol. 129, pp. 444–458, 2017.

    Google Scholar 

  6. A. Azmoodeh, A. Dehghantanha, M. Conti, and K.-K. R. Choo, “Detecting crypto-ransomware in IoT networks based on energy consumption footprint,” J. Ambient Intell. Humaniz. Comput., pp. 1–12, Aug. 2017.

    Google Scholar 

  7. D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012.

    Google Scholar 

  8. S. Walker-Roberts, M. Hammoudeh, and A. Dehghantanha, “A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure,” IEEE Access, 2018.

    Google Scholar 

  9. M. Alaa, A. A. Zaidan, B. B. Zaidan, M. Talal, and M. L. M. Kiah, “A review of smart home applications based on Internet of Things,” J. Netw. Comput. Appl., vol. 97, pp. 48–65, 2017.

    Google Scholar 

  10. A. Azmoodeh, A. Dehghantanha, and K.-K. R. Choo, “Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning,” IEEE Trans. Sustain. Comput., pp. 1–1, 2018.

    Google Scholar 

  11. S. Watson and A. Dehghantanha, “Digital forensics: the missing piece of the Internet of Things promise,” Comput. Fraud Secur., vol. 2016, no. 6, pp. 5–8, Jun. 2016.

    Google Scholar 

  12. H. HaddadPajouh, A. Dehghantanha, R. Khayami, and K.-K. R. Choo, “A Deep Recurrent Neural Network Based Approach for Internet of Things Malware Threat Hunting”, Future Generation Computer System,” Futur. Gener. Comput. Syst., 2017.

    Google Scholar 

  13. M. Conti, T. Dargahi, and A. Dehghantanha, “Cyber Threat Intelligence: Challenges and Opportunities,” Springer, Cham, 2018, pp. 1–6.

    Book  Google Scholar 

  14. M. Hopkins and A. Dehghantanha, “Exploit Kits: The production line of the Cybercrime economy?,” in 2015 2nd International Conference on Information Security and Cyber Forensics, InfoSec 2015, 2016.

    Google Scholar 

  15. V. Suhendra, “A Survey on Access Control Deployment,” in Security Technology, 2011, pp. 11–20.

    Google Scholar 

  16. D. Kiwia, A. Dehghantanha, K.-K. R. Choo, and J. Slaughter, “A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence,” J. Comput. Sci., Nov. 2017.

    Google Scholar 

  17. S. Homayoun, A. Dehghantanha, M. Ahmadzadeh, S. Hashemi, and R. Khayami, “Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence,” IEEE Trans. Emerg. Top. Comput., pp. 1–1, 2017.

    Google Scholar 

  18. R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Comput. Networks, vol. 57, no. 10, pp. 2266–2279, 2013.

    Google Scholar 

  19. S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” Comput. Networks, vol. 76, pp. 146–164, 2015.

    Google Scholar 

  20. M. R. Abdmeziem and D. Tandjaoui, “An end-to-end secure key management protocol for e-health applications,” Comput. Electr. Eng., vol. 44, pp. 184–197, 2015.

    Google Scholar 

  21. D. Mishra, A. Gunasekaran, S. J. Childe, T. Papadopoulos, R. Dubey, and S. Wamba, “Vision, applications and future challenges of Internet of Things: A bibliometric study of the recent literature,” Ind. Manag. Data Syst., vol. 116, no. 7, pp. 1331–1355, 2016.

    Google Scholar 

  22. J. Ruiz-Rosero, G. Ramirez-Gonzalez, J. M. Williams, H. Liu, R. Khanna, and G. Pisharody, “Internet of Things: A Scientometric Review,” Symmetry (Basel)., vol. 9, no. 12, 2017.

    Google Scholar 

  23. A. Ouaddah, H. Mousannif, A. A. Elkalam, and A. A. Ouahman, “Access control in the Internet of Things: Big challenges and new opportunities,” Comput. Networks, vol. 112, pp. 237–262, 2017.

    Google Scholar 

  24. M. F. A. Razak, N. B. Anuar, R. Salleh, and A. Firdaus, “The rise of ‘malware’: Bibliometric analysis of malware study,” J. Netw. Comput. Appl., vol. 75, pp. 58–76, 2016.

    Google Scholar 

  25. J. Baldwin, O. M. K. Alhawi, S. Shaughnessy, A. Akinbi, and A. Dehghantanha, Emerging from the cloud: A bibliometric analysis of cloud forensics studies, vol. 70. 2018.

    Google Scholar 

  26. J. Gill, I. Okere, H. HaddadPajouh, and A. Dehghantanha, Mobile forensics: A bibliometric analysis, vol. 70. 2018.

    Google Scholar 

  27. M. A. Meyers and H. Quan, “The use of the h-index to evaluate and rank academic departments,” J. Mater. Res. Technol., vol. 6, no. 4, pp. 304–311, Oct. 2017.

    Google Scholar 

  28. J. L. Hernández-Ramos, M. P. Pawlowski, A. J. Jara, A. F. Skarmeta, and L. Ladid, “Toward a Lightweight Authentication and Authorization Framework for Smart Objects,” IEEE J. Sel. Areas Commun., vol. 33, no. 4, pp. 690–702, 2015.

    Google Scholar 

  29. G. Tuna, D. G. Kogias, V. C. Gungor, C. Gezer, E. Taşkın, and E. Ayday, “A survey on information security threats and solutions for Machine to Machine (M2M) communications,” J. Parallel Distrib. Comput., vol. 109, pp. 142–154, 2017.

    Google Scholar 

  30. R. Mayrhofer and H. Gellersen, “Spontaneous mobile device authentication based on sensor data,” Inf. Secur. Tech. Rep., vol. 13, no. 3, pp. 136–150, 2008.

    Google Scholar 

  31. C. Lai, H. Li, R. Lu, and X. (Sherman) Shen, “SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks,” Comput. Networks, vol. 57, no. 17, pp. 3492–3510, 2013.

    Google Scholar 

  32. K. Grover and A. Lim, “A survey of broadcast authentication schemes for wireless networks,” Ad Hoc Networks, vol. 24, pp. 288–316, 2015.

    Google Scholar 

  33. N. Ruan and Y. Hori, “DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things,” in 2012 International Conference on Selected Topics in Mobile and Wireless Networking, 2012, pp. 60–65.

    Google Scholar 

  34. S. Kosunalp, Y. Chu, P. D. Mitchell, D. Grace, and T. Clarke, “Use of Q-learning approaches for practical medium access control in wireless sensor networks,” Eng. Appl. Artif. Intell., vol. 55, pp. 146–154, 2016.

    Google Scholar 

  35. H. S. G. Pussewalage and V. A. Oleshchuk, “Attribute based access control scheme with controlled access delegation for collaborative E-health environments,” J. Inf. Secur. Appl., vol. 37, pp. 50–64, 2017.

    Google Scholar 

  36. N. Khalil, M. R. Abid, D. Benhaddou, and M. Gerndt, “Wireless sensors networks for Internet of Things,” in 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014, pp. 1–6.

    Google Scholar 

  37. Y. Duroc and S. Tedjini, “RFID: A key technology for Humanity,” Comptes Rendus Phys., vol. 19, no. 1, pp. 64–71, 2018.

    Google Scholar 

  38. J. V. V Sobral et al., “A framework for enhancing the performance of Internet of Things applications based on RFID and WSNs,” J. Netw. Comput. Appl., vol. 107, pp. 56–68, 2018.

    Google Scholar 

  39. B. J. Mohd, T. Hayajneh, K. M. A. Yousef, Z. A. Khalaf, and M. Z. A. Bhuiyan, “Hardware design and modeling of lightweight block ciphers for secure communications,” Futur. Gener. Comput. Syst., vol. 83, pp. 510–521, 2018.

    Google Scholar 

  40. K. Mahmood, S. A. Chaudhry, H. Naqvi, S. Kumari, X. Li, and A. K. Sangaiah, “An elliptic curve cryptography based lightweight authentication scheme for smart grid communication,” Futur. Gener. Comput. Syst., vol. 81, pp. 557–565, 2018.

    Google Scholar 

  41. M. Gentili, R. Sannino, and M. Petracca, “BlueVoice: Voice communications over Bluetooth Low Energy in the Internet of Things scenario,” Comput. Commun., vol. 89–90, pp. 51–59, 2016.

    Google Scholar 

  42. K. B. Raja, R. Raghavendra, M. Stokkenes, and C. Busch, “Multi-modal authentication system for smartphones using face, iris and periocular,” in 2015 International Conference on Biometrics (ICB), 2015, pp. 143–150.

    Google Scholar 

  43. Y. Liu, B. Dong, B. Guo, J. Yang, and W. Peng, “Combination of Cloud Computing and Internet of Things (IOT) in Medical Monitoring Systems,” Int. J. Hybrid Inf. Technol., vol. 8, no. 12, pp. 367–376, 2015.

    Google Scholar 

  44. C. Dores, L. P. Reis, and N. V Lopes, “Internet of things and cloud computing,” in 2014 9th Iberian Conference on Information Systems and Technologies (CISTI), 2014, pp. 1–4.

    Google Scholar 

  45. J. A. Guerrero-ibanez, S. Zeadally, and J. Contreras-Castillo, “Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies,” IEEE Wirel. Commun., vol. 22, no. 6, pp. 122–128, 2015.

    Google Scholar 

  46. F. Lauria, “How to footprint, report and remotely secure compromised IoT devices,” Netw. Secur., no. December 2017, pp. 10–16, Dec. 2017.

    Google Scholar 

  47. G. Roussos and V. Kostakos, “rfid in pervasive computing: State-of-the-art and outlook,” Pervasive Mob. Comput., vol. 5, no. 1, pp. 110–131, 2009.

    Google Scholar 

  48. M. Turkanović, B. Brumen, and M. Hölbl, “A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion,” Ad Hoc Networks, vol. 20, pp. 96–112, 2014.

    Google Scholar 

  49. P. P. Ray, “A survey on Internet of Things architectures,” J. King Saud Univ. - Comput. Inf. Sci., 2016.

    Google Scholar 

  50. J. Lopez, R. Rios, F. Bao, and G. Wang, “Evolving privacy: From sensors to the Internet of Things,” Futur. Gener. Comput. Syst., vol. 75, pp. 46–57, 2017.

    Google Scholar 

  51. A. Shalaginov, S. Banin, A. Dehghantanha, and K. Franke, Machine learning aided static malware analysis: A survey and tutorial, vol. 70. 2018.

    Google Scholar 

  52. H. H. Pajouh, A. Dehghantanha, R. Khayami, and K.-K. R. Choo, “Intelligent OS X malware threat detection with code inspection,” J. Comput. Virol. Hacking Tech., 2017.

    Google Scholar 

  53. N. Milosevic, A. Dehghantanha, and K.-K. R. Choo, “Machine learning aided Android malware classification,” Comput. Electr. Eng.

    Google Scholar 

  54. Y.-Y. Teing, A. Dehghantanha, K. K. R. Choo, and L. T. Yang, “Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study,” Comput. Electr. Eng., 2016.

    Google Scholar 

  55. Y.-Y. Teing, A. Dehghantanha, K.-K. R. Choo, T. Dargahi, and M. Conti, “Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study,” J. Forensic Sci., vol. 62, no. 3, pp. 641–654, May 2017.

    Google Scholar 

  56. O. Osanaiye, H. Cai, K.-K. R. Choo, A. Dehghantanha, Z. Xu, and M. Dlodlo, “Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing,” Eurasip J. Wirel. Commun. Netw., vol. 2016, no. 1, 2016.

    Google Scholar 

  57. S. Homayoun, M. Ahmadzadeh, S. Hashemi, A. Dehghantanha, and R. Khayami, BoTShark: A deep learning approach for botnet traffic detection, vol. 70. 2018.

    Google Scholar 

  58. A. D. James Baldwin, Omar Alhawi, Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection. Cyber Threat Intelligence- Springer Book, 2017.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ali Dehghantanha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Grooby, S., Dargahi, T., Dehghantanha, A. (2019). A Bibliometric Analysis of Authentication and Access Control in IoT Devices. In: Dehghantanha, A., Choo, KK. (eds) Handbook of Big Data and IoT Security. Springer, Cham. https://doi.org/10.1007/978-3-030-10543-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-10543-3_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-10542-6

  • Online ISBN: 978-3-030-10543-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics