Employing an authentication scheme for WSNs, which can be applicable for IoT as well.
Vulnerable to an insider, offline guessing, user forgery, and sensor node physical capture attack. Not providing session key security and mutual authentication.
User authentication and key establishment for a heterogeneous architecture of WSNs.
Vulnerable to password guessing in offline mode through the lost/stolen smart card, user impersonation, and session-specific temporary information leakage attack.
Authentication scheme based on ECC for industrial IoT.
Requires high computational overhead for the resource-constrained sensor nodes and cannot provide essential functionality features like the biometric update.