Abstract

The Internet of Things (IoT) is revolutionizing everyday life and industrial processes by enabling connected devices to communicate, analyze, and act autonomously. As IoT devices increasingly transmit sensitive data, secure communication becomes paramount, with authentication serving as the foundation for ensuring data confidentiality and integrity. This paper explores various authentication methods tailored to IoT devices communicating with servers via the HTTP protocol, offering theoretical insights and practical implementation guidelines.

Each method is thoroughly examined concerning its advantages, disadvantages, and suitability for different IoT environments. Implementations are provided for both client-side (IoT devices) and server-side using technologies like JavaScript and PHP (Laravel). Particular attention is given to the resource constraints typical of IoT devices, such as limited processing power and memory.

Keywords: API key, decentralized identifications, energy efficiency, HTTP, IoT, JWT, quantum cryptography, MAC address, authentication methods, OAuth 2.0, TLS certificates, artificial intelligence.
Published on website: 20.12.2024
Attached files: santic1.pdf