Review Article

A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Table 9

Robustness evaluation against attacks.

SchemeMutual AuthenticationKey agreementUser anonymityPassword changeReplay attackImpersonation attackPassword change attackParallel session attackGateway node bypassing attackSmart card/smart device stolen attackMan-in-the-middle attackDenial-of-service attack

He et al. [83]
An [86]
Xue et al. [91]
Turkanović et al. [39]
Chen et al. [94]
Das and Goswami [95]
Dhillon and Kalra [79]