Survey on security and privacy for the IoT Privacy preserving schemes Authentication protocols Comments Weber (2010) [15 ] 0 X Presented milestones of an adequate legal framework for IoT privacy Medaglia and Serbanati (2010) [16 ] 0 X Presented a Short-Term and Long-Term vision for IoT privacy Roman et al. (2011) [89 ] X X Analyzed some key management systems for sensor networks in the context of the IoT (public key cryptography and preshared keys) Miorandi et al. (2012) [94 ] 0 X Presented some security challenges in IoT, including Data confidentiality, Privacy, and Trust Suo et al. (2012) [105 ] X X Discussed the security requirements in each level for IoT (four key levels, i.e., recognition layer, network layer, support layer, and application layer) Aggarwal et al. (2013) [90 ] 0 X Discussed the privacy in data collection, and during data transmission and sharing Roman et al. (2013) [106 ] X X Presented the security issues in distributed IoT systems Yan et al. (2014) [107 ] ✓ X Surveyed the privacy-preserving schemes IoT, including database query, scientific computations, intrusion detection, and data mining Jing et al. (2014) [108 ] X X Discussed the security issues and technical solutions in WSNs Chabridon et al. (2014) [109 ] ✓ X Surveyed the state of the art of privacy technology from the perspective of the IoT Ziegeldorf et al. [110 ] ✓ X Surveyed the privacy threats and challenges in the IoT Keoh et al. (2014) [112 ] X X Presented an overview of the efforts in the IETF to standardize security solutions for the IoT ecosystem Sicari et al. (2015) [113 ] 0 X Discussed the privacy, trust, enforcement, secure middleware, and mobile security in the IoT Granjal et al. (2015) [114 ] X 0 Discussed IoT communications and security at the physical and MAC layers Sadeghi et al. (2015) [115 ] X X Discussed an introduction to Industrial IoT systems with the related security and privacy challenges Nguyen et al. (2015) [116 ] 0 X Surveyed the secure communication protocols for the IoT, including asymmetric key schemes and symmetric key predistribution schemes He and Zeadally (2015) [121 ] X 0 Analyzed only the RFID authentication schemes for the IoT in healthcare environment using elliptic curve cryptography Xie et al. (2016) [111 ] X X Reviewed the security issues for Web of Things Singh et al. (2016) [117 ] X X Analyzed the state of cloud-supported IoT to make explicit the security considerations Li et al. (2016) [118 ] X X Analyzed the security requirements and potential threats in a four-layer architecture for the IoT Airehrour et al. (2016) [119 ] X X Analyzed the security of routing protocols for the IoT Our work 0 ✓ Surveyed the authentication protocols for the IoT in four environments, including Machine to Machine Communications (M2M), Internet of Vehicles (IoV), Internet of Energy (IoE), and Internet of Sensors (IoS)