Review Article

A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Table 8

Comparison of authentication schemes based on association phase.

SchemeDescriptionNumber of messages

Wazid et al. [37]Proposing an authentication protocol for WSNs using ECC.5 (if the use of a gateway be required, the number of messages can be duplicated)
Kothmayr et al. [87]Presenting an authentication scheme employing Data-gram Transport Layer Security (DTLS) algorithm.5 (can be augmented similar to change cipher suite message and become 8)
Jan et al. [97]Developing a robust IoT authentication scheme.4
Hartke and Tschofenig [98]Presenting an authentication scheme applying DTLS algorithm.5 (can be appended similar to change cipher suite message and become 8)
Hammi et al. [69]Proposing a decentralized blockchain-based authentication system for IoT.2