Review Article

A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Table 2

IoT-cloud architecture authentication schemes.

SchemeMethodWeakness

Liao and Wang [23]Multiserver architecture authentication scheme with the dynamic identity concept.Vulnerable to user and server forgery attacks.
Hsiang and Shih [24]The secure dynamic id improvement according to the remote user authentication scheme in a multiserver environment.Vulnerable to wrong password change, replay attack, and impersonation attack.
Sood et al. [25]A secure dynamic identity-based authentication protocol for multiserver architecture.ā€‰
Lee et al. [26]A new dynamic identity authentication scheme employed in a multiserver situation.Vulnerable to forgery attack and stolen-verifier attack.
Li et al. [27]Employing smart cards in a multiserver architecture.Vulnerable to impersonation attack, offline password guessing attack, etc.
Leu and Hsieh [28]Employing smart cards as a secure dynamic id-based remote authentication scheme for distributed systems.Vulnerable to offline password guessing attack if smart card loss.
Xue et al. [29]A pseudonym identity-based authentication with key agreement protocol.Inadequate identity-hidden feature and vulnerable to the offline password guessing attack.
Shunmuganathan et al. [30]Employing smart-card-based remote user authentication.Vulnerable to replay, offline password guessing, and impersonation attack.
Zhu [31]Flexible and password-authenticated key agreement scheme based on chaotic maps for multiple server architecture.The user tracking attack could affect for multiserver framework.
Li et al. [32]Using an improved smart card authentication scheme.Vulnerable to offline password guessing attack.
Irshad et al. [33]Applying the anonymous-based authentication key agreement in the multiserver architecture.Vulnerable to user tracking and insider attack.
Maitra et al. [34]Employing password and smart card: cryptanalysis and design.Vulnerable to the offline guessing and user tracking attack.
Amin et al. [35]A lightweight authentication protocol for IoT-enabled devices in a distributed computing environment.Vulnerable to the offline guessing attack and does not satisfy audit property.
Zhou et al. [36]Employing a lightweight two-factor authentication scheme that consists of one-way hash function and exclusive-or operation with cloud assistance.ā€‰