Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Table 6

Summary of attacks in Internet of Energy (IoE) and defense protocols.

Adversary model Authentication protocols for IoE
[28][49][138][139][140][141][142][55][67]

Audio replay attackXXXXXXXXX
Changing distance attack0XXXX000X
Same-type-device attackXXX0XXXXX
Composition attackXXXXXXXXX
Redirection attackXXX0X0XXX
Man-in-the-middle attack0000000
Substitution attackX0XXXX00X
DoS attackXX0X0X0
Replay attack000
Forging attack0000XXXX
Colluding attackX0X00X00X
Flooding attackX0X0XX000
Side-channel attackXXXXX000X
False messages attack0000000
Sybil attack000000XX0
Movement tracking0XXXX0XX0
Message modification0000000
Impersonation attack00XX0X000
Guessing attackX0X0XXXXX
Stolen-verifier attackXXXXXXXXX
Wormhole attackXX0XX0000
Blackhole attackXX0XX0000
Attribute-trace attackXXX0X0XXX
Eavesdropping attack000000000
Chosen-plaintext attackXXX0XXXX
Spam attackXXX0XXXXX
Identity theft attackXX000X000
User manipulation attackXXXX0XXX0
Routing attackXX00XXXXX
Linkability attack0X00XX00X
Rejection attack0X000X000
Successive-response attack0XX0XXXX0
Packet analysis attack0000X00
Packet tracing attack00X000000
Brute-force attackXXXXX0X

✓ indicates fully supported; X indicates not supported; 0 indicates partially supported.