Review Article

A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Table 3

Authentication schemes applicable for cloud-driven IoT-based big data environment.

SchemeDescriptionWeakness

Yeh et al. [38]Employing elliptic curve cryptography (ECC) for user authentication in wireless sensor networks (WSNs).Not support mutual authentication.
Turkanović et al. [39]User authentication and key agreement scheme for heterogeneous wireless sensor networks.Vulnerable to offline password and identity guessing.
Hsieh and Leu [40]Employing an authentication scheme for WSNs, which can be applicable for IoT as well.Vulnerable to an insider, offline guessing, user forgery, and sensor node physical capture attack. Not providing session key security and mutual authentication.
Farash et al. [41]User authentication and key establishment for a heterogeneous architecture of WSNs.Vulnerable to password guessing in offline mode through the lost/stolen smart card, user impersonation, and session-specific temporary information leakage attack.
Challa et al. [42]Authentication scheme based on ECC digital signature.Inadequate computation and communication overheads in IoT.
Li et al. [43]Authentication scheme based on ECC for industrial IoT.Requires high computational overhead for the resource-constrained sensor nodes and cannot provide essential functionality features like the biometric update.