Review Article
Survey of Authentication and Authorization for the Internet of Things
Table 3
Summary of authentication articles.
| Article | Centralized | Decentralized | U2M | M2M | Context-aware | Factor | Domain | Specifics |
| [14] | Yes | Yes | Yes | No | Yes | Inherence | Any | Service answering whether user can be in the given location | [15] | Yes | Yes | Yes | Yes | No | Possession | Any | Use of attributes for authentication | [16] | Yes | No | Yes | Yes | No | N/A | Cloud | Authentication through cloud | [17] | Yes | Yes | Yes | No | No | N/A | Any | Reading QR codes physically present on a device | [18] | Yes | Yes | N/A | N/A | No | Knowledge | Healthcare | Framework designed to preserve patient privacy | [19] | Yes | No | Yes | Yes | No | Knowledge | Any | Adjustment of Web API management; OpenID Connect | [20] | No | Yes | Yes | Yes | No | Possession | Any | Authentication for devices with constrained computational power | [21] | Yes | No | No | Yes | No | Knowledge | Any | ARM compliant; EAPoL; RADIAL | [22] | No | Yes | Yes | No | No | Inherence | Healthcare | Biometric from wearable and nearables | [23] | Yes | No | Yes | Yes | No | N/A | Healthcare | OpenID Connect | [24] | Yes | No | Yes | Yes | No | N/A | Any | Authentication framework mathematical description using CSP algebra | [25] | Yes | No | Yes | Yes | No | N/A | Any | HTTPS-based device authentication using hash chain as One Time Password | [26] | N/A | N/A | Yes | No | Yes | Inherence | Any | Biometric; continuous authentication | [27] | Yes | No | Yes | No | Yes | Knowledge | Any | User’s electronical history | [28] | Yes | No | Yes | Yes | No | N/A | Healthcare | Authentication based on attributes | [29] | Yes | No | Yes | Yes | No | Knowledge | Any | OpenID Connect | [30] | N/A | N/A | No | Yes | No | N/A | Any | WS-Security adaptation for IoT | [31] | N/A | N/A | Yes | No | No | Knowledge | Any | One time passwords using words chosen by a user | [32] | Yes | No | Yes | Yes | No | Possession | Healthcare | Full security framework | [33] | No | Yes | Yes | Yes | No | N/A | Any | Blockchain access control framework | [34] | N/A | N/A | No | Yes | No | Possession | No | Authentication on perception level | [35] | No | Yes | Yes | Yes | Yes | Knowledge | Any | Privacy preserving based on partial identities |
|
|