Review Article
Internet of Things Security: Challenges and Key Issues
Table 3
Advantages and limitations in some IoT-based authentication schemes.
| Protocol | Advantages | Limitations |
| [113] | Is lightweight | Uses only hash function | [114] | Can detect man-in-the-middle attacks | Uses certificates that need an important space in memory | [90] | Can be implemented in real-time IoT networks | Vulnerable | Based on two-factor authentication | [89] | Can deal against insider attack based on bilinear maps | Needs complex computation | [84] | Surpasses HOTP | Is heavyweight | Not efficient for IoT devices | [115] | Offers mutual authentication | Vulnerable against some attacks | [116] | Guarantees authentication and session key exchange | Does not cover all IoT service requirements | [74] | Can be used with cloud servers | Cannot resist all attacks | [117] | Very lightweight | Based only on one hash function | [118] | Lightweight mutual authentication | Operates only in CoAP-based IoT environment | [119] | Can be used for authentication protocol for IoT-based RFID systems | The running time of protocol is not very fast |
|
|