Review Article
A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices
Table 8
Comparison of authentication schemes based on association phase.
| Scheme | Description | Number of messages |
| Wazid et al. [37] | Proposing an authentication protocol for WSNs using ECC. | 5 (if the use of a gateway be required, the number of messages can be duplicated) | Kothmayr et al. [87] | Presenting an authentication scheme employing Data-gram Transport Layer Security (DTLS) algorithm. | 5 (can be augmented similar to change cipher suite message and become 8) | Jan et al. [97] | Developing a robust IoT authentication scheme. | 4 | Hartke and Tschofenig [98] | Presenting an authentication scheme applying DTLS algorithm. | 5 (can be appended similar to change cipher suite message and become 8) | Hammi et al. [69] | Proposing a decentralized blockchain-based authentication system for IoT. | 2 |
|
|