Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Table 4

Summary of attacks in Machine to Machine Communications (M2M) and defense protocols.

Adversary model Authentication protocols for M2M
[62][61][46][38][34][53][47][137][37]

Audio replay attack0X000XX0
Changing distance attackXXXXXXXX
Same-type-device attackXXXXXXXX
Composition attackXXXXXXXX
Redirection attack00XX0X
Man-in-the-middle attack0000XX
Substitution attack00000XXXX
DoS attackXXXXXX
Replay attack0XX0XX
Forging attackXXX0XXXXX
Colluding attack0XX0XX0XX
Flooding attack0XXXXX0X0
Side-channel attack0XXXXX0X0
False messages attack0XXX000X0
Sybil attackXXXX00XX0
Movement trackingXXXX0XXX0
Message modificationXXXX0XXXX
Impersonation attackXXXX0XX
Guessing attackXXXXXXXX
Stolen-verifier attackXXXXXXXX
Wormhole attack00X0X0XX0
Blackhole attack00X000XX0
Attribute-trace attackXXXX0XXXX
Eavesdropping attackXXXX00XX0
Chosen-plaintext attackXXXX0XXX0
Spam attack0XXX00XX0
Identity theft attack0XXXX0XXX
User manipulation attack0XXXX00X0
Routing attack0XXXX0XXX
Linkability attack0XXXXXXXX
Rejection attackXXXXXXXXX
Successive-response attackXXXXXXXXX
Packet analysis attackX0XXX0XX0
Packet tracing attackX0XXX0XX0
Brute-force attack00X00X00X

✓ indicates fully supported; X indicates not supported; 0 indicates partially supported.