Review Article

Internet of Things Security: Challenges and Key Issues

Table 2

Classification of some IoT authentication schemes.

ProtocolProposed for securingMethod used
IoTWSNEncryption algorithmRandom numberHash functionOthers

[128]
[129]Time synchronization
[110]ECCLamport’s OTP algorithm
[109]Zero-knowledge proof
[104]AES-based MAC
[130]ECC
[131]ECCSmart card
[132]ECC
[133]
[134]AES
[83]Symmetric encryption
[15]Fuzzy extractor mechanism
[20]ECCChallenge-response
[135]Symmetric encryptionBlockchain machine learning
[136]ECC-

ECC: elliptic curve cryptography; AES: Advanced Encryption Standard; OTP: one time password; WSN: wireless sensor network.