Review Article
Authentication Protocols for Internet of Things: A Comprehensive Survey
Table 11
Cryptosystems and Countermeasures used in authentication protocols for Machine to Machine Communications (M2M).
| Cryptosystems and countermeasures | Authentication protocols for M2M | [62] | [61] | [46] | [38] | [34] | [53] | [47] | [137] | [37] |
| Secure cryptographic hash function [149] | | ✓ | ✓ | ✓ | ✓ | ✓ | | ✓ | ✓ | Original data acquisition | | | | | | | | ✓ | | Spatial-Domain transformation | | | | | | | | ✓ | | Time-domain transformation | | | | | | | | ✓ | | Correlation coefficient-based matching algorithm (C-MA) | ✓ | | | | | | | | | Deviation ratio-based matching algorithm (D-MA) | ✓ | | | | | | | | | Aggregate message authentication codes (AMACs) [150] | | ✓ | | | | | | | ✓ | Certificateless aggregate signature [151] | | | ✓ | | | | | | | Elliptic Curve Diffie-Hellman (ECDH) [152] | | | | ✓ | | | | | | ID-based signature scheme [153] | | | | | ✓ | | | | | Advanced encryption standard (AES) [154] | | | | | | ✓ | | | | Hybrid Linear Combination Encryption [155] | | | | | | | ✓ | | |
|
|