Applications that make use of the Internet of Things (IoT), such as the smart
home (S-home), are growing in popularity as more and more smart gadgets are
becoming available and affordable. However, existing authentication solutions may not
be adequate for protecting IoT settings due to the peculiarities of these contexts, such
as the utilization of devices with limited resources. This has led to the development of a
variety of different authentication techniques that are specifically designed for the
environment of the Internet of Things. An exhaustive overview of the current
authentication techniques is given in this work. This chapter presents noteworthy
contributions, which are outlined as follows: It begins by introducing a general model
that was created using an S-Home use-case scenario. In order to identify potential entry
points for an attack, it then conducts a threat assessment using the model as a basis.
The study can be considered successful if it defines a workable set of security
requirements for creating S-home authentication solutions. Third, based on the needs, a
comparison of the current authentication methods is conducted, and recommendations
are provided for achieving effective and efficient authentication in IoT settings. IoT
computing provides additional benefits to users through the use of internet-connected
smart appliances, objects, and gadgets. It is vital to process the data generated by
intelligent IoT devices securely.
Keywords: Authentication, IoT, Internet of things, S-home, Security.