Review Article
A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices
Table 9
Robustness evaluation against attacks.
| Scheme | Mutual Authentication | Key agreement | User anonymity | Password change | Replay attack | Impersonation attack | Password change attack | Parallel session attack | Gateway node bypassing attack | Smart card/smart device stolen attack | Man-in-the-middle attack | Denial-of-service attack |
| He et al. [83] | ✕ | ✕ | ✓ | ✓ | ✓ | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | An [86] | ✕ | ✓ | ✕ | ✕ | ✓ | ✕ | ✕ | ✓ | ✕ | ✓ | ✕ | ✓ | Xue et al. [91] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✕ | ✕ | ✓ | ✓ | ✕ | ✕ | Turkanović et al. [39] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Chen et al. [94] | ✓ | ✕ | ✓ | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | ✕ | Das and Goswami [95] | ✓ | ✓ | ✕ | ✓ | ✓ | ✕ | ✕ | ✕ | ✕ | ✕ | ✓ | ✓ | Dhillon and Kalra [79] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
|
|