Review Article
Authentication Protocols for Internet of Things: A Comprehensive Survey
Table 13
Cryptosystems and countermeasures used in authentication protocols for Internet of Energy (IoE).
| Cryptosystems and countermeasures | Authentication protocols for IoE | [28] | [49] | [138] | [139] | [140] | [141] | [142] | [55] | [67] |
| Secure cryptographic hash function [149] | ✓ | | ✓ | | | ✓ | ✓ | | | HORS scheme [170] | ✓ | | | | | | | | | Heavy signing light verification (HSLV) [170] | ✓ | | | | | | | | | Light signing heavy verification (LSHV) [170] | ✓ | | | | | | | | | Merkle Hash tree technique [171] | | ✓ | | | | | | | | Short signatures (BLS) [172] | | | ✓ | | | | | | | Batch verification [173] | | | ✓ | | | | | | | Signature aggregation [174] | | | ✓ | | | | | | | Identity-based public key cryptosystem [165] | | | | ✓ | | | | | | Public-key encryption, such as RSA [175] | | | | | ✓ | | | ✓ | | HMAC, such as SHA-1 [176] and MD5 [177] | | | | | ✓ | | | ✓ | ✓ | Diffie-Hellman key establishment protocol [178] | | | | | | ✓ | | | | EIBC mechanism [179] | | | | | | | ✓ | | | ID-based cryptography (IBC) [180] | | | | | | | ✓ | | | Digital signatures [167] | | | | | | | | ✓ | | Homomorphic encryption [181] | | | | | | | | ✓ | | Bloom filter [182] | | | | | | | | ✓ | | Commitment scheme | | | | | | | | ✓ | | Symmetric encryption/decryption algorithm [178] | | | | | | | | | ✓ |
|
|