Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Table 10

Approaches for detecting and avoiding the replay attack.

Protocol Data attacked Approach

Lai et al. (2013) [38]Replaying the data between the mobiles equipment and the 3GPP networkRandom numbers
Sun et al. (2015) [53]Replaying the intercepted login messageRandom numbers
Lai et al. (2013) [37]Replaying the message between serving gateway and home subscriber serverRandom numbers
Cespedes et al. (2013) [39]Replaying one of the router solicitation messagesRandom numbers
Wasef and Shen (2013) [40]Replaying the disseminated messages in IoVTimestamp
Shao et al. (2016) [63]Replaying the disseminated messages in IoVTimestamp
Zhang et al. (2016) [52]Replaying the disseminated messages in IoVTimestamp
Li et al. (2014) [49]Replaying the electricity consumption reportsMerkle hash tree technique
Nicanfar et al. (2011) [139]Replaying the electricity consumption reportsTimestamp
Chim et al. (2011) [140]Replaying the electricity consumption reportsTimestamp
Fouda et al. (2011) [141]Replaying the electricity consumption reportsTimestamp
Nicanfar et al. (2014) [142]Forwarding a previous acknowledgment from the smart meter to the serverTimestamp
Mahmood et al. (2016) [67]Intercept messages by home area network and replay those archaic messages to building area network gatewayTimestamp
Kumari et al. (2016) [68]Intercept and replay the login request to gateway wireless nodeTimestamp
Jan et al. (2016) [143]Eavesdrop on advertisement packets and/or join-request packets and replay in other parts of the networkHash function and ring keys
Amin and Biswas (2016) [70]Replaying the message in the IoSTimestamp
Das (2016) [72]Replaying the login request messageTimestamp
Chang and Le (2016) [73]Replaying the login request messageTimestamp
Farash et al. (2016) [75]Replaying the login request messageTimestamp
Srinivas et al. (2017) [144]Replaying the messages in the IoSTimestamp
Kumari et al. (2016) [76]Intercept and replay the login request to gateway wireless nodeTimestamp
Jiang et al. (2017) [77]Intercept the login requestTimestamp
Liu and Chung [148]Intercept the login requestTimestamp