Review Article

Survey of Authentication and Authorization for the Internet of Things

Table 3

Summary of authentication articles.

Article Centralized Decentralized U2M M2M Context-aware Factor Domain Specifics

[14] Yes Yes Yes No Yes Inherence Any Service answering whether user can be in the given location
[15] Yes Yes Yes Yes No Possession Any Use of attributes for authentication
[16] Yes No Yes Yes No N/A Cloud Authentication through cloud
[17] Yes Yes Yes No No N/A Any Reading QR codes physically present on a device
[18] Yes Yes N/A N/A No Knowledge Healthcare Framework designed to preserve patient privacy
[19] Yes No Yes Yes No Knowledge Any Adjustment of Web API management; OpenID Connect
[20] No Yes Yes Yes No Possession Any Authentication for devices with constrained computational power
[21] Yes No No Yes No Knowledge Any ARM compliant; EAPoL; RADIAL
[22] No Yes Yes No No Inherence Healthcare Biometric from wearable and nearables
[23] Yes No Yes Yes No N/A Healthcare OpenID Connect
[24] Yes No Yes Yes No N/A Any Authentication framework mathematical description using CSP algebra
[25] Yes No Yes Yes No N/A Any HTTPS-based device authentication using hash chain as One Time Password
[26] N/A N/A Yes No Yes Inherence Any Biometric; continuous authentication
[27] Yes No Yes No Yes Knowledge Any User’s electronical history
[28] Yes No Yes Yes No N/A Healthcare Authentication based on attributes
[29] Yes No Yes Yes No Knowledge Any OpenID Connect
[30] N/A N/A No Yes No N/A Any WS-Security adaptation for IoT
[31] N/A N/A Yes No No Knowledge Any One time passwords using words chosen by a user
[32] Yes No Yes Yes No Possession Healthcare Full security framework
[33] No Yes Yes Yes No N/A Any Blockchain access control framework
[34] N/A N/A No Yes No Possession No Authentication on perception level
[35] No Yes Yes Yes Yes Knowledge Any Privacy preserving based on partial identities