Review Article

A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Table 4

Developed attestation schemes and the drawbacks.

SchemeDescriptionWeakness

Kong et al. [67]PUFatt links software-based attestation to fundamental device characteristics through a novel processor-based PUF, which provide a lightweight remote attestation scheme.(i) Requires any hardware modifications.
(ii) High computation and storage overhead.
(iii) No real performance and implementation details of the integrated system.
(iv) Does not support mutual authentication.
(v) Vulnerable to modeling attacks by machine-learning techniques, and security protocols are unsafe.
Schulz et al. [68]A lightweight remote attestation scheme that employs PUFs to connect software attestation to remotely identifiable hardware.(i) Generating additional CRPs enhance the computational and communication difficulty that is not appropriate for low-end devices.