|
Scheme | Year | Cryptographic techniques and environment | Advantages | Drawbacks/limitations |
|
Xu et al. [15] | 2021 | Based on PUF is applicable for RFID healthcare systems | Fits for healthcare systems | Does not support “revocability.” Vulnerable to “know session key attack” |
|
Gope and Sikdar [16] | 2019 | Based on smart grid communication systems. The lightweight cryptographic primitives such as physically unclonable functions and one-way hash function is utilized | A novel privacy-aware authenticated key agreement scheme which can not only ensure secure communication between smart meters and the service providers, but also the physical security of smart meters | (i) Does not support “revocability and password/biometric update” |
(ii) Vulnerable to “known session key attack” |
|
Cao et al. [17] | 2021 | (i) Based on “three factors (user mobile device, user password, and personal biometrics” | (i) Applicable in smart grid environment and data collection scheme | (i) Does not support “revocability and password/biometric update” |
(ii) Applies “ECC cryptographic technique” | (ii) Vulnerable to “mutual authentication attack” and “known session key attack” |
(iii) Uses “fuzzy extractor for biometric verification” |
|
Zhang et al. [18] | 2020 | Key distribution in wireless sensor networks | It did not only save the storage overhead, but also provided perfect resilience against sensor capture attacks | This cannot resist anonymity, traceability, and forward secrecy attacks |
|
Mall et al. [19] | 2022 | This approach is a survey on PUF-based authentication and key agreement protocols for IoT, WSN, and smart grids | (i) This survey paper can be utilized to understand the technologies such as IoT, WSN, and smart grids and the way to address the AKA in these technologies | This study fails to address the security pitfalls which can integrate all these technologies |
(ii) Systematically and taxonomically examine and discuss with pros and cons of AKA applications to the fast-growing areas of IoT, WSNs, and smart grids based on a meticulous survey of existing literature |
|
Liu et al. [20] | 2021 | Key distribution for dynamic sensor networks | Compared with traditional key predistribution schemes, the proposal reduces the storage overhead and the key exposure risks and thereby improves the resilience against node capture attacks | This study cannot be applied to the current technologies such as IoT and cloud computing |
|
Mukhopadhyay [21] | 2016 | PUFs as promising tools for security in Internet of Things. This article discusses about security violation in the authentication of a commercial IoT | (i) Studied the lightweight construction of PUFs | This study fails to address the security features and how they can be applied for the AKA protocols |
(ii) Proof context test-bed simulations were presented for commercially available tools to show how PUFs can interact with other IoT nodes to provide overall security |
|
Wang et al. [22] | 2021 | Blockchain and lightweight authentication protocol for wireless medical sensor networks. Applies “fuzzy extractor for biometric verification” | Incorporated for blockchain and wireless medical sensor networks | (i) Desynchronization attacks |
(ii) Excess communication cost |
|
Lee and Chen [23] | 2021 | Lightweight fog computing-based authentication protocols using physically unclonable functions for Internet of medical Things | (i) The proposed protocols use lightweight cryptographic operations, including a one-way cryptographic hash function, the barrel shifter physically unclonable function (BS-PUF) | This study is restricted to fog environment |
(ii) This study ensures the security of the sensors and fog nodes and to avoid a computational burden on devices |
|
Hassija et al. [24] | 2021 | A survey on supply chain security: application areas, security threats, and solution architectures | (i) This article discusses the supply chain’s security critical application areas and presents a detailed survey of the security issues in the existing supply chain architecture | This study is a survey work and fails to address the security features and how they can be applied for the AKA protocols |
(ii) Various emerging technologies, such as blockchain, machine learning (ML), and physically unclonable functions (PUFs) as solutions to the vulnerabilities in the existing infrastructure of the supply chain |
|