ABSTRACT

Authentication in cryptography is an important parameter in terms of foolproof security. Authentication enables communicating parties to verify their identity and their correctness. The chapter discusses introduction to authentication, need of authentication in the internet of things (IoT), authentication issues at each layer of IoT architecture, various phases of generalized authentication schemes, and application wise authentication requirements. Physical layer in the internet of things is the backbone of a complete IoT system. The agriculture industry is not explored that much in the internet of things application due to a more concentrated focus on health and business. The chapter talks about major types of devices involved and different authentication phases like registration, key exchange, login and authentication, password update, device adding phase. It also talks about a cloud centric approach for the internet of things and the need for authentication. The chapter examines application wise security loopholes and authentication requirements in each application.