Review Article

Authentication Protocols for Internet of Things: A Comprehensive Survey

Table 8

Approaches for detecting and avoiding the man-in-the-middle attack.

Protocol Data attacked Approach

Lai et al. (2016) [61]Communication channel between the mobile management entity and the home subscriber serverMutual authentication and key agreement between multiple M2M devices and the core network simultaneously

Lai et al. (2013) [38]The data between the mobiles equipment’s and the 3GPP networkAuthentication acknowledge phase

Cespedes et al. (2013) [39](i) Identify a shared key between two legitimate users
(ii) Impersonate a mobile router or a relay router
The keys generated at the mobile router and the relay router for authentication are based on the concept of symmetric polynomials

Dolev et al. (2016) [66]Communication channel between the vehicles(i) Twofold authentication
(ii) Periodic certificate restore

Nicanfar et al. (2011) [139](i) Communication channel between the smart meter and the authentication agent
(ii) Communication channel between the authentication agent and the security associate (SA) server
All packets are fully encrypted with the receivers public key

Nicanfar et al. (2014) [142]The passwords of smart meterChanging the server password more often

Das (2016) [72]The login request message during the login phasePassword and biometric update phase

Lai et al. (2013) [37]Can occur while connecting to a base stationAuthentication acknowledge phase

Farash et al. (2016) [75]Data between the sensor node, users, and gateway nodeMutual authentication

Jiang et al. (2017) [77]Data between the Sensor node, users and Gateway nodeMutual authentication

Wu et al. (2016) [146]Data between the Sensor node, users and Gateway nodeMutual authentication

Das et al. (2016) [147]The lost/stolen smart card of a legal userPassword change phase