Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Table 15

The smart card-based authentication protocols.

Protocol Type Design goal

Das (2016) [72] Remote authenticationProviding a user authentication to resolve the security weaknesses of the scheme [190]
Chang and Le (2016) [73] Remote authenticationProviding mutual authentication and perfect forward secrecy
Jiang et al. (2016) [74] Remote authenticationProviding mutual authentication, anonymity, and untraceability
Farash et al. (2016) [75] Remote authenticationProviding the user authentication with traceability protection and sensor node anonymity
Srinivas et al. (2017) [144] Remote authenticationProviding the mutual authentication with anonymity and unlinkability