Review Article
Authentication Protocols for Internet of Things: A Comprehensive Survey
Table 14
Cryptosystems and countermeasures used in authentication protocols for Internet of Sensors (IoS).
| Cryptosystems and countermeasures | Authentication protocols for IoS | [68] | [69] | [143] | [70] | [71] | [72] | [73] | [74] | [75] | [144] | [76] | [145] | [77] | [146] |
| Secure cryptographic hash function [149] | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | | Chebyshev chaotic maps [183] | ✓ | | | | | | | | | | | | | | Chebyshev polynomials [184] | ✓ | | | | | | | | | | | | | | ID-based cryptography (IBC) [180] | | ✓ | | ✓ | ✓ | | | | | | | | | | Advanced encryption standard (AES) [185] | | | ✓ | | | | | | | | | | | | Biometric | | | | | | ✓ | | | | | | | | | Password | | | | | | ✓ | | | | ✓ | ✓ | | | | Smart card | | | | | | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | | | | Fuzzy extractor technique [186] | | | | | | ✓ | | | | | | | | ✓ | Elliptic Curve Diffie-Hellman (ECDH) [152] | | | | | | | ✓ | ✓ | | | | | | | Key agreement | | | | | | | | | ✓ | ✓ | ✓ | | | | Biohashing [187] | | | | | | ✓ | | | | | | | | | Access polynomial [188] | | | | | | | | | | | | ✓ | | | Elliptic curve cryptography [189] | | | | | | | | | | | | | ✓ | ✓ |
|
|