Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Table 14

Cryptosystems and countermeasures used in authentication protocols for Internet of Sensors (IoS).

Cryptosystems and countermeasures Authentication protocols for IoS
[68][69][143][70][71][72][73][74][75][144][76][145][77][146]

Secure cryptographic hash function [149]
Chebyshev chaotic maps [183]
Chebyshev polynomials [184]
ID-based cryptography (IBC) [180]
Advanced encryption standard (AES) [185]
Biometric
Password
Smart card
Fuzzy extractor technique [186]
Elliptic Curve Diffie-Hellman (ECDH) [152]
Key agreement
Biohashing [187]
Access polynomial [188]
Elliptic curve cryptography [189]