Review Article
Authentication Protocols for Internet of Things: A Comprehensive Survey
Table 6
Summary of attacks in Internet of Energy (IoE) and defense protocols.
| Adversary model | Authentication protocols for IoE | [28] | [49] | [138] | [139] | [140] | [141] | [142] | [55] | [67] |
| Audio replay attack | X | X | X | X | X | X | X | X | X | Changing distance attack | 0 | X | X | X | X | 0 | 0 | 0 | X | Same-type-device attack | X | X | X | 0 | X | X | X | X | X | Composition attack | X | X | X | X | X | X | X | X | X | Redirection attack | X | X | X | 0 | X | 0 | X | X | X | Man-in-the-middle attack | 0 | 0 | 0 | ✓ | 0 | 0 | ✓ | 0 | 0 | Substitution attack | X | 0 | X | X | X | X | 0 | 0 | X | DoS attack | X | X | 0 | ✓ | X | 0 | ✓ | X | 0 | Replay attack | 0 | ✓ | 0 | ✓ | ✓ | ✓ | ✓ | 0 | ✓ | Forging attack | ✓ | 0 | 0 | 0 | 0 | X | X | X | X | Colluding attack | X | 0 | X | 0 | 0 | X | 0 | 0 | X | Flooding attack | X | 0 | X | 0 | X | X | 0 | 0 | 0 | Side-channel attack | X | X | X | X | X | 0 | 0 | 0 | X | False messages attack | 0 | ✓ | 0 | 0 | 0 | 0 | 0 | 0 | ✓ | Sybil attack | 0 | 0 | 0 | 0 | 0 | 0 | X | X | 0 | Movement tracking | 0 | X | X | X | X | 0 | X | X | 0 | Message modification | 0 | ✓ | 0 | 0 | 0 | 0 | 0 | 0 | ✓ | Impersonation attack | 0 | 0 | X | X | 0 | X | 0 | 0 | 0 | Guessing attack | X | 0 | X | 0 | X | X | X | X | X | Stolen-verifier attack | X | X | X | X | X | X | X | X | X | Wormhole attack | X | X | 0 | X | X | 0 | 0 | 0 | 0 | Blackhole attack | X | X | 0 | X | X | 0 | 0 | 0 | 0 | Attribute-trace attack | X | X | X | 0 | X | 0 | X | X | X | Eavesdropping attack | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | Chosen-plaintext attack | X | X | X | 0 | X | ✓ | X | X | X | Spam attack | X | X | X | 0 | X | X | X | X | X | Identity theft attack | X | X | 0 | 0 | 0 | X | 0 | 0 | 0 | User manipulation attack | X | X | X | X | 0 | X | X | X | 0 | Routing attack | X | X | 0 | 0 | X | X | X | X | X | Linkability attack | 0 | X | 0 | 0 | X | X | 0 | 0 | X | Rejection attack | 0 | X | 0 | 0 | 0 | X | 0 | 0 | 0 | Successive-response attack | 0 | X | X | 0 | X | X | X | X | 0 | Packet analysis attack | 0 | ✓ | 0 | 0 | 0 | X | 0 | 0 | ✓ | Packet tracing attack | 0 | 0 | X | 0 | 0 | 0 | 0 | 0 | 0 | Brute-force attack | X | X | X | ✓ | X | X | ✓ | 0 | X |
|
|
✓ indicates fully supported; X indicates not supported; 0 indicates partially supported.
|