Review Article

Internet of Things Security: Challenges and Key Issues

Table 3

Advantages and limitations in some IoT-based authentication schemes.

ProtocolAdvantagesLimitations

[113]Is lightweightUses only hash function
[114]Can detect man-in-the-middle attacksUses certificates that need an important space in memory
[90]Can be implemented in real-time IoT networksVulnerable
Based on two-factor authentication
[89]Can deal against insider attack based on bilinear mapsNeeds complex computation
[84]Surpasses HOTPIs heavyweight
Not efficient for IoT devices
[115]Offers mutual authenticationVulnerable against some attacks
[116]Guarantees authentication and session key exchangeDoes not cover all IoT service requirements
[74]Can be used with cloud serversCannot resist all attacks
[117]Very lightweightBased only on one hash function
[118]Lightweight mutual authenticationOperates only in CoAP-based IoT environment
[119]Can be used for authentication protocol for IoT-based RFID systemsThe running time of protocol is not very fast