Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Table 3

A comparison of related surveys in the literature (surveys on security and privacy for the IoT).

Survey on security and privacy for the IoT Privacy preserving schemesAuthentication protocols Comments

Weber (2010) [15]0XPresented milestones of an adequate legal framework for IoT privacy

Medaglia and Serbanati (2010) [16]0XPresented a Short-Term and Long-Term vision for IoT privacy

Roman et al. (2011) [89]XXAnalyzed some key management systems for sensor networks in the context of the IoT (public key cryptography and preshared keys)

Miorandi et al. (2012) [94]0XPresented some security challenges in IoT, including Data confidentiality, Privacy, and Trust

Suo et al. (2012) [105]XXDiscussed the security requirements in each level for IoT (four key levels, i.e., recognition layer, network layer, support layer, and application layer)

Aggarwal et al. (2013) [90]0XDiscussed the privacy in data collection, and during data transmission and sharing

Roman et al. (2013) [106]XXPresented the security issues in distributed IoT systems

Yan et al. (2014) [107]XSurveyed the privacy-preserving schemes IoT, including database query, scientific computations, intrusion detection, and data mining

Jing et al. (2014) [108]XXDiscussed the security issues and technical solutions in WSNs

Chabridon et al. (2014) [109]XSurveyed the state of the art of privacy technology from the perspective of the IoT

Ziegeldorf et al. [110]XSurveyed the privacy threats and challenges in the IoT

Keoh et al. (2014) [112]XXPresented an overview of the efforts in the IETF to standardize security solutions for the IoT ecosystem

Sicari et al. (2015) [113]0XDiscussed the privacy, trust, enforcement, secure middleware, and mobile security in the IoT

Granjal et al. (2015) [114]X0Discussed IoT communications and security at the physical and MAC layers

Sadeghi et al. (2015) [115]XXDiscussed an introduction to Industrial IoT systems with the related security and privacy challenges

Nguyen et al. (2015) [116]0XSurveyed the secure communication protocols for the IoT, including asymmetric key schemes and symmetric key predistribution schemes

He and Zeadally (2015) [121]X0Analyzed only the RFID authentication schemes for the IoT in healthcare environment using elliptic curve cryptography

Xie et al. (2016) [111]XXReviewed the security issues for Web of Things

Singh et al. (2016) [117]XXAnalyzed the state of cloud-supported IoT to make explicit the security considerations

Li et al. (2016) [118]XXAnalyzed the security requirements and potential threats in a four-layer architecture for the IoT

Airehrour et al. (2016) [119]XXAnalyzed the security of routing protocols for the IoT

Our work0Surveyed the authentication protocols for the IoT in four environments, including Machine to Machine Communications (M2M), Internet of Vehicles (IoV), Internet of Energy (IoE), and Internet of Sensors (IoS)

✓ indicates fully supported; X indicates not supported; 0 indicates partially supported.