Review Article
Authentication Protocols for Internet of Things: A Comprehensive Survey
Table 4
Summary of attacks in Machine to Machine Communications (M2M) and defense protocols.
| Adversary model | Authentication protocols for M2M | [62] | [61] | [46] | [38] | [34] | [53] | [47] | [137] | [37] |
| Audio replay attack | ✓ | 0 | X | 0 | 0 | 0 | X | X | 0 | Changing distance attack | ✓ | X | X | X | X | X | X | X | X | Same-type-device attack | ✓ | X | X | X | X | X | X | X | X | Composition attack | ✓ | X | X | X | X | X | X | X | X | Redirection attack | 0 | ✓ | 0 | ✓ | X | X | 0 | X | ✓ | Man-in-the-middle attack | 0 | ✓ | 0 | ✓ | 0 | 0 | X | X | ✓ | Substitution attack | 0 | 0 | 0 | 0 | 0 | X | X | X | X | DoS attack | X | ✓ | X | ✓ | X | X | ✓ | X | X | Replay attack | 0 | X | X | ✓ | 0 | ✓ | X | X | ✓ | Forging attack | X | X | X | 0 | X | X | X | X | X | Colluding attack | 0 | X | X | 0 | X | X | 0 | X | X | Flooding attack | 0 | X | X | X | X | X | 0 | X | 0 | Side-channel attack | 0 | X | X | X | X | X | 0 | X | 0 | False messages attack | 0 | X | X | X | 0 | 0 | 0 | X | 0 | Sybil attack | X | X | X | X | 0 | 0 | X | X | 0 | Movement tracking | X | X | X | X | 0 | X | X | X | 0 | Message modification | X | X | X | X | 0 | X | X | X | X | Impersonation attack | X | X | X | X | 0 | ✓ | ✓ | X | X | Guessing attack | X | X | X | X | X | ✓ | X | X | X | Stolen-verifier attack | X | X | X | X | X | ✓ | X | X | X | Wormhole attack | 0 | 0 | X | 0 | X | 0 | X | X | 0 | Blackhole attack | 0 | 0 | X | 0 | 0 | 0 | X | X | 0 | Attribute-trace attack | X | X | X | X | 0 | X | X | X | X | Eavesdropping attack | X | X | X | X | 0 | 0 | X | X | 0 | Chosen-plaintext attack | X | X | X | X | 0 | X | X | X | 0 | Spam attack | 0 | X | X | X | 0 | 0 | X | X | 0 | Identity theft attack | 0 | X | X | X | X | 0 | X | X | X | User manipulation attack | 0 | X | X | X | X | 0 | 0 | X | 0 | Routing attack | 0 | X | X | X | X | 0 | X | X | X | Linkability attack | 0 | X | X | X | X | X | X | X | X | Rejection attack | X | X | X | X | X | X | X | X | X | Successive-response attack | X | X | X | X | X | X | X | X | X | Packet analysis attack | X | 0 | X | X | X | 0 | X | X | 0 | Packet tracing attack | X | 0 | X | X | X | 0 | X | X | 0 | Brute-force attack | 0 | 0 | X | 0 | 0 | X | 0 | 0 | X |
|
|
✓ indicates fully supported; X indicates not supported; 0 indicates partially supported.
|