Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Table 11

Cryptosystems and Countermeasures used in authentication protocols for Machine to Machine Communications (M2M).

Cryptosystems and countermeasuresAuthentication protocols for M2M
[62][61][46][38][34][53][47][137][37]

Secure cryptographic hash function [149]
Original data acquisition
Spatial-Domain transformation
Time-domain transformation
Correlation coefficient-based matching algorithm (C-MA)
Deviation ratio-based matching algorithm (D-MA)
Aggregate message authentication codes (AMACs) [150]
Certificateless aggregate signature [151]
Elliptic Curve Diffie-Hellman (ECDH) [152]
ID-based signature scheme [153]
Advanced encryption standard (AES) [154]
Hybrid Linear Combination Encryption [155]