Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Table 13

Cryptosystems and countermeasures used in authentication protocols for Internet of Energy (IoE).

Cryptosystems and countermeasures Authentication protocols for IoE
[28][49][138][139][140][141][142][55][67]

Secure cryptographic hash function [149]
HORS scheme [170]
Heavy signing light verification (HSLV) [170]
Light signing heavy verification (LSHV) [170]
Merkle Hash tree technique [171]
Short signatures (BLS) [172]
Batch verification [173]
Signature aggregation [174]
Identity-based public key cryptosystem [165]
Public-key encryption, such as RSA [175]
HMAC, such as SHA-1 [176] and MD5 [177]
Diffie-Hellman key establishment protocol [178]
EIBC mechanism [179]
ID-based cryptography (IBC) [180]
Digital signatures [167]
Homomorphic encryption [181]
Bloom filter [182]
Commitment scheme
Symmetric encryption/decryption algorithm [178]