• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

智慧城市中物联网设备认证技术综述:机遇、挑战与未来方向

A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions.

作者信息

Alotaibi Ashwag, Aldawghan Huda, Aljughaiman Ahmed

机构信息

Department of Computer Networks and Communications, College of Computer Sciences and Information Technology, King Faisal University, Al-Ahsa 31982, Saudi Arabia.

出版信息

Sensors (Basel). 2025 Mar 7;25(6):1649. doi: 10.3390/s25061649.

DOI:10.3390/s25061649
PMID:40292695
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11944561/
Abstract

Smart cities have witnessed a transformation in urban living through the Internet of Things (IoT), which has improved connectedness, efficiency, and sustainability. However, the adoption of IoT devices presents significant security vulnerabilities, particularly in authentication. The specific limitations of IoT contexts, such as constrained computational resources, are frequently not adequately addressed by traditional authentication techniques. The existing methods of authentication used for IoT devices in smart cities are critically examined in this review study. We evaluate the advantages and disadvantages of each mechanism, emphasizing real-world applicability. Additionally, we examine cutting-edge developments that offer improved security and scalability, such as blockchain technology, biometric authentication, and machine learning-based solutions. This study aims to identify gaps and propose future research directions to develop robust authentication frameworks that protect user privacy and data integrity.

摘要

智慧城市通过物联网(IoT)见证了城市生活的变革,物联网提升了连接性、效率和可持续性。然而,物联网设备的采用带来了重大的安全漏洞,尤其是在身份验证方面。物联网环境的特定限制,如计算资源受限,传统身份验证技术往往无法充分应对。本综述研究对智慧城市中用于物联网设备的现有身份验证方法进行了批判性审视。我们评估了每种机制的优缺点,强调其在现实世界中的适用性。此外,我们还研究了能提供更高安全性和可扩展性的前沿发展,如区块链技术、生物识别身份验证和基于机器学习的解决方案。本研究旨在找出差距并提出未来的研究方向,以开发能保护用户隐私和数据完整性的强大身份验证框架。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/e52a86342807/sensors-25-01649-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/4d6e450dcd4d/sensors-25-01649-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/8ff02a8ebfd1/sensors-25-01649-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/05be9f416020/sensors-25-01649-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/d5396af5eedf/sensors-25-01649-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/d148cd683c12/sensors-25-01649-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/d0193563bef4/sensors-25-01649-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/76a2aa49ab3f/sensors-25-01649-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/28e3c7c3782e/sensors-25-01649-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/91bf23e3f1eb/sensors-25-01649-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/d29e0bfd8e2d/sensors-25-01649-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/75536434a4c5/sensors-25-01649-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/8057e5328dca/sensors-25-01649-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/690c6e090b43/sensors-25-01649-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/f2d2ede53ba1/sensors-25-01649-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/c99f6c08feb6/sensors-25-01649-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/f0aab6fdf0ae/sensors-25-01649-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/e52a86342807/sensors-25-01649-g017.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/4d6e450dcd4d/sensors-25-01649-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/8ff02a8ebfd1/sensors-25-01649-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/05be9f416020/sensors-25-01649-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/d5396af5eedf/sensors-25-01649-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/d148cd683c12/sensors-25-01649-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/d0193563bef4/sensors-25-01649-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/76a2aa49ab3f/sensors-25-01649-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/28e3c7c3782e/sensors-25-01649-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/91bf23e3f1eb/sensors-25-01649-g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/d29e0bfd8e2d/sensors-25-01649-g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/75536434a4c5/sensors-25-01649-g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/8057e5328dca/sensors-25-01649-g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/690c6e090b43/sensors-25-01649-g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/f2d2ede53ba1/sensors-25-01649-g014.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/c99f6c08feb6/sensors-25-01649-g015.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/f0aab6fdf0ae/sensors-25-01649-g016.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/602f/11944561/e52a86342807/sensors-25-01649-g017.jpg

相似文献

1
A Review of the Authentication Techniques for Internet of Things Devices in Smart Cities: Opportunities, Challenges, and Future Directions.智慧城市中物联网设备认证技术综述:机遇、挑战与未来方向
Sensors (Basel). 2025 Mar 7;25(6):1649. doi: 10.3390/s25061649.
2
A Comparative Analysis on Blockchain versus Centralized Authentication Architectures for IoT-Enabled Smart Devices in Smart Cities: A Comprehensive Review, Recent Advances, and Future Research Directions.区块链与集中式认证架构在智慧城市物联网智能设备中的比较分析:全面回顾、最新进展和未来研究方向。
Sensors (Basel). 2022 Jul 10;22(14):5168. doi: 10.3390/s22145168.
3
Blockchain-Based Authentication and Trust Management Mechanism for Smart Cities.基于区块链的智慧城市认证与信任管理机制。
Sensors (Basel). 2022 Mar 29;22(7):2604. doi: 10.3390/s22072604.
4
Blockchain-Based Secure Authentication with Improved Performance for Fog Computing.基于区块链的安全认证,提高雾计算性能。
Sensors (Basel). 2022 Nov 19;22(22):8969. doi: 10.3390/s22228969.
5
Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction.物联网中用于认证和授权的机器学习:分类法、挑战与未来研究方向
Sensors (Basel). 2021 Jul 28;21(15):5122. doi: 10.3390/s21155122.
6
Hyperledger Fabric Blockchain for Securing the Edge Internet of Things.用于保障边缘物联网安全的超级账本织物区块链
Sensors (Basel). 2021 Jan 7;21(2):359. doi: 10.3390/s21020359.
7
A secure end-to-end communication framework for cooperative IoT networks using hybrid blockchain system.一种使用混合区块链系统的协作物联网网络的安全端到端通信框架。
Sci Rep. 2025 Apr 1;15(1):11077. doi: 10.1038/s41598-025-96002-w.
8
A secure and trustworthy blockchain-assisted edge computing architecture for industrial internet of things.一种用于工业物联网的安全可靠的区块链辅助边缘计算架构。
Sci Rep. 2025 May 2;15(1):15410. doi: 10.1038/s41598-025-00337-3.
9
Hybrid computing framework security in dynamic offloading for IoT-enabled smart home system.支持物联网的智能家居系统动态卸载中的混合计算框架安全
PeerJ Comput Sci. 2024 Aug 23;10:e2211. doi: 10.7717/peerj-cs.2211. eCollection 2024.
10
Blockchain Based Solutions to Mitigate Distributed Denial of Service (DDoS) Attacks in the Internet of Things (IoT): A Survey.基于区块链的物联网(IoT)中减轻分布式拒绝服务(DDoS)攻击的解决方案:一项综述。
Sensors (Basel). 2022 Jan 31;22(3):1094. doi: 10.3390/s22031094.

引用本文的文献

1
Adaptive conflict resolution for IoT transactions: A reinforcement learning-based hybrid validation protocol.物联网交易的自适应冲突解决:一种基于强化学习的混合验证协议。
Sci Rep. 2025 Jul 15;15(1):25589. doi: 10.1038/s41598-025-09698-1.
2
Among the DLTs: Holochain for the Security of IoT Distributed Networks-A Review and Conceptual Framework.在分布式账本技术(DLTs)中:用于物联网分布式网络安全的全链——综述与概念框架。
Sensors (Basel). 2025 Jun 21;25(13):3864. doi: 10.3390/s25133864.

本文引用的文献

1
Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in an IoT Environment.物联网环境中使用去中心化区块链的两层多因素认证
Sensors (Basel). 2024 Jun 1;24(11):3575. doi: 10.3390/s24113575.
2
Using machine learning algorithms to enhance IoT system security.使用机器学习算法增强物联网系统安全性。
Sci Rep. 2024 May 27;14(1):12077. doi: 10.1038/s41598-024-62861-y.
3
The utility of behavioral biometrics in user authentication and demographic characteristic detection: a scoping review.行为生物识别在用户认证和人口特征检测中的效用:范围综述。
Syst Rev. 2024 Feb 8;13(1):61. doi: 10.1186/s13643-024-02451-1.
4
A Review of IoT Firmware Vulnerabilities and Auditing Techniques.物联网固件漏洞与审计技术综述
Sensors (Basel). 2024 Jan 22;24(2):708. doi: 10.3390/s24020708.
5
Code Injection Attacks in Wireless-Based Internet of Things (IoT): A Comprehensive Review and Practical Implementations.基于无线的物联网(IoT)中的代码注入攻击:全面综述与实际实现
Sensors (Basel). 2023 Jun 30;23(13):6067. doi: 10.3390/s23136067.
6
IoT malware: An attribute-based taxonomy, detection mechanisms and challenges.物联网恶意软件:基于属性的分类法、检测机制与挑战。
Peer Peer Netw Appl. 2023 May 10:1-52. doi: 10.1007/s12083-023-01478-w.
7
A review of multi-factor authentication in the Internet of Healthcare Things.医疗物联网中的多因素认证综述。
Digit Health. 2023 May 22;9:20552076231177144. doi: 10.1177/20552076231177144. eCollection 2023 Jan-Dec.
8
Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey.智慧城市的网络安全和网络取证:全面文献回顾与调查。
Sensors (Basel). 2023 Apr 2;23(7):3681. doi: 10.3390/s23073681.
9
Access Control for IoT: A Survey of Existing Research, Dynamic Policies and Future Directions.物联网访问控制:现有研究、动态策略和未来方向的调查。
Sensors (Basel). 2023 Feb 6;23(4):1805. doi: 10.3390/s23041805.
10
Detection and Mitigation of IoT-Based Attacks Using SNMP and Moving Target Defense Techniques.基于 SNMP 和移动目标防御技术的物联网攻击检测与缓解。
Sensors (Basel). 2023 Feb 3;23(3):1708. doi: 10.3390/s23031708.