Review Article
Authentication Protocols for Internet of Things: A Comprehensive Survey
Table 15
The smart card-based authentication protocols.
| Protocol | Type | Design goal |
| Das (2016) [72] | Remote authentication | Providing a user authentication to resolve the security weaknesses of the scheme [190] | Chang and Le (2016) [73] | Remote authentication | Providing mutual authentication and perfect forward secrecy | Jiang et al. (2016) [74] | Remote authentication | Providing mutual authentication, anonymity, and untraceability | Farash et al. (2016) [75] | Remote authentication | Providing the user authentication with traceability protection and sensor node anonymity | Srinivas et al. (2017) [144] | Remote authentication | Providing the mutual authentication with anonymity and unlinkability |
|
|