You are on page 1of 31

Ad Hoc Networks 146 (2023) 103159

Contents lists available at ScienceDirect

Ad Hoc Networks
journal homepage: www.elsevier.com/locate/adhoc

Survey paper

A comprehensive survey on authentication and secure key management in


internet of things: Challenges, countermeasures, and future directions
Patruni Muralidhara Rao a, B.D. Deebak a, b, *
a
School of Computer Science and Engineering, Vellore Institute of Technology, Vellore 632014, India
b
Department of Computer Engineering, Gachon University, Seongnam 13120, South Korea

A R T I C L E I N F O A B S T R A C T

Keywords: Critical infrastructures such as healthcare, intelligent transportation, and home automation adapt billions of
Security and privacy smart IoT devices to handle real-time data effectively in the digital era. The latest development in sensory and
Authentication communication technologies collaborate directly with modern applications to bridge networking services
Key-management
without human intervention. Most information systems enable the extension of digital technology to demonstrate
Internet of things
the potential use of next-generation network services and management. However, recent advancements open
Network Models
various opportunities, including repudiation, data tampering, and security threats in digital security and privacy.
Thus, this survey article chooses a systematic literature review to present a comprehensive survey on authen­
tication and key management in IoT. To discuss the major issues involved in IoT environments, this survey
categorizes the work progress into four modules: 1. Discuss the broad aspects of convergence technologies,
including healthcare, smart farming, intelligent transportation, etc., to address challenges such as security and
privacy in IoT; 2. Conduct a comprehensive review of state-of-the-art technologies to identify security re­
quirements, services, and challenges associated with modern IoT applications; 3. Present a systematic approach
to review various key agreement schemes based on network models and performance analysis to examine po­
tential vulnerabilities. 4. Show a thematic analysis to determine suitable corrective measurements dealing with
various security and privacy issues. Finally, this paper rationalizes significant progress, including research
challenges and future directions in IoT to promote new insights.

1. Introduction various sensors’ data [1]. Due to the fast-growing evolving technologies,
securing IoT devices are highly preferred. Thus, secure authentication
Of late, the creation of Internet applications has become increasingly and key agreement mechanisms are utilized to achieve the security re­
important in people’s lives. However, optimized Internet usage ac­ quirements like user anonymity, mutual authenticity, and perfect se­
cording to the level of program utilization might be a difficult task, crecy. IoT systems apply authentication and key agreement (AKA)
especially for researchers. Besides, the Internet of Things has been protocols to ensure authenticity and preserve the privacy of every
created to connect real-world objects to the Internet (IoT).In the past sensing unit. Each unit can provide standard access control to the
years, various definitions have been extracted from several organiza­ network and obtain the corresponding session key to establish secure
tions working with the IoT domain. IoT can be a collection of physical communication [2].
things embedded with sensors and actuators with computational capa­ However, communication over insecure networks cannot handle
bilities to communicate between the devices and systems. With the fast attackers due to the existence of unauthorised system information. This
expansion of IoT, the secure incorporation of Wireless Sensor Networks system may perform a few malicious activities such as flooding and
(WSN) is all-important to allow these smart devices to communicate denial of service to compromise the devices and network. As a result,
with each other. The WSN can be a strong IoT network that consists of standard protection systems are essential to protect the network and
various nodes with typical characteristics and constraints deployed in protect against various security vulnerabilities. Different cryptographic-
distant locations. These devices’ main functionalities are detecting based protocols are employed to ensure system security and to evaluate
environmental monitoring changes and collecting and processing the performance requirements of the computing devices namely

* Corresponding author
E-mail address: deebak@gachon.ac.kr (B.D. Deebak).

https://doi.org/10.1016/j.adhoc.2023.103159
Received 5 June 2022; Received in revised form 25 December 2022; Accepted 21 March 2023
Available online 23 March 2023
1570-8705/© 2023 Elsevier B.V. All rights reserved.
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

reliability, durability, and power consumption. However, traditional encryption to protect the sensitive information of the IoT networks.
cryptographic protocols cannot support less computing power, less Data Validity in Modern IoT is the best practice to discover a data
bandwidth consumption, less storage, and the battery capacity of WSNs. validation network that has network intelligence to generate massive
Providing security and offering resource constraints of WSN are the most amounts of IoT data varied at different levels of scalability which fulfill a
crucial research aspects in IoT environments. Therefore, researchers few desired requirements of the IoT applications namely monitoring
have focused more on various security protocols for emerging wireless over the different processors and programming language with minimum
sensor networks (WSNs) and IoT technologies [3]. Indeed, the success of overhead.
proposing lightweight mechanisms in WSNs depends on the distinctive Maintaining device connectivity inherits the salient features of
features of sensor nodes. The resource constraints WSNs impose added privacy-preserving technologies to explore the security evolution of
challenges for the design of security protocols. With the rapid growth of next-generation networks which systematically review the efforts of the
WSNs, security improvements offer substantial benefits to deal with existing state-of-the-art approaches to examine the challenges of three-
security solutions based on the requirements of IoT applications. The layer architecture. This layered architecture considers physical,
distinctive characteristics of WSNs are similar to distributed networks connection, and service to classify its security requirements, vulnera­
and much more susceptible to malicious attacks. Safety is the necessary bilities, attacks, and future directions. Particularly, the core issues of IoT
aspect of each application that uses WSN mainly for the sensors applications consider the interconnectivity of IoT devices to carry out a
deployed in distant locations, including battlefields, airports, large in­ holistic view of the security frameworks addressing the fundamental
dustrial systems, critical buildings, and many more. WSN is a particular challenges of authentication and key management in IoT.
category of wireless network and can impose specific unique charac­
teristics in addition to the typical integration of four basic components 1.1. review methodology
such as user interface and device connectivity. As a result, the WSN
security protocols need to satisfy additional security conditions which This survey uses electronic databases (e.g., IEEE Xplore, ScienceDir­
relate to security specifications and trustworthiness of data [4]. ect, Springer, ACM Digital library, and Wiley online library) to collect the
Advanced wireless communication has witnessed a technological revo­ relevant research articles based on the inclusion and exclusion criteria
lution in the development of IoT applications using centralized cloud depicted in Fig. 1. This survey paper follows the combination of quali­
computing. Unfortunately, a centralized computing system explores a tative and quantitative systematic literature review mechanisms to the
high-cost efficiency application to manage network function, problem statement. Pickering et al.’s [5] review approach carries
computing, and storage which inflicts a few additional workloads on numerous advantages over narrative fashion. Their methods present a
radio access networks resulting in high latency issues. As a result, the comprehensive survey of identifying existing studies and highlight
explosive growth in various end computing devices demands digital research gaps. Moreover, we use online databases and other relevant
transformation to meet the challenges of emerging IoT namely enhanced sources to find various reviews and research articles to meet specific
security, capacity constraints, and resource constrained. Expanding criteria. Then, we record all the studies’ information and summarize it in
their computing services flexibly may use a new computing paradigm to a state-of-the-art table throughout the study. Various scientific papers
share and generate useful information without human intervention. were collected from multiple online databases like IEEE Xplore (http
However, data communication over a public network conceives to be s://ieeexplore.ieee.org/Xplore/home.jsp), Science Direct (https://www
insecure due to the subsistence of adversaries stealing the information of .sciencedirect.com/), ACM Digital Library (https://dl.acm.org/), Wiley
unauthorised systems. Building a secure channel considers authentica­ Online Library (https://onlinelibrary.wiley.com/), Google Scholar
tion and key agreement (AKA) to prevent adversary behaviors. More­ (https://scholar.google.com/), Education Resources Information Center
over, the end computing systems involve different delivery of services (ERIC- https://eric.ed.gov/), and PubMed Central (https://www.ncbi.
such as software databases, storage, and networking via Internet con­ nlm.nih.gov/pmc/) to conduct a comparative analysis. The search key­
nectivity to set up an advanced network infrastructure. This infra­ words of the scientific articles include "security, privacy, architectures,
structure leverages the scope of a custom-built network to offer a IoT environments, WSN for IoT environments, authentication, key
seamless and cost-effective network that has an end-to-end service to agreement, security protocols, and energy efficiency, etc." Fig. 2 depicts
assess and monitor the degree of network connectivity. The network the review mechanism’s systematic approach, and the steps are below
infrastructure applies a protective measurement to prevent any unau­ [6].
thorised user access and to gain system access over the target infra­ Most emerging technologies continue the course of their trajectory in
structure. However, the computing trade-off between security and the deployment of large-scale IoT applications to address potential
performance needs a comprehensive analysis of various security mech­ challenges such as security and privacy. The prior generation has out­
anisms to understand the challenges of modern IoT architecture. The key lined the impact of strengths and weaknesses of the security frameworks
aspects of modern IoT are as follows: focusing on three major requirements namely security, privacy, integ­
Data Security in Modern IoT is an operative practice to protect digital rity, confidentiality, and validity. Most legacy systems have their own
information from unauthorised systems which adopts the strategies of futuristic technology to enhance the privacy preservation of next-
robust data security to protect the information of the organization generation networks Thus, this paper mainly focuses on the security
against cyber activities. Accessing and securing information systems concerns of IoT applications to investigate technical insights, protocol
utilizes physical hardware security to administer the logical security of deficiencies, and required enhancement. Providing seamless informa­
the application systems which include encryption solutions to manage tion, the communication infrastructure relies on IoT applications to
the policies and procedures of application security. store and analyze the essential components of the computing devices
Data Integrity in Modern IoT is a protective scheme to maintain and such as sensors, device connectivity, cloud access, data analytics, and
assure better accuracy in the completeness of a few sensitive assets of IT user interface. The functional components of the devices integrate with a
operation. Most connected devices explore the cryptography primitives heterogeneous network which issues a massive connection with discrete
such as message authentication codes and digital signatures to deal with quality of service (QoS) across the globe. Moreover, improving wireless
semi-trusted remote data storage which relies on the verification connectivity and autonomous systems broadens the scope of the
mechanism to maintain data consistency. networking systems to identify the possible vulnerabilities infringed by
Data Confidentiality in Modern IoT is a systematic solution to use a adversaries to attack the performance of the systems. The communica­
branch of a cryptosystem to offer a certain level of hardware security tion links and network vulnerabilities deliberately infiltrate the cyber
without compromising any additional resource consumption. Most threats in the application programming interfaces to devise a few po­
cryptographic solutions apply symmetric and asymmetric key tential benefits such as attacking the system infrastructure, stealing

2
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Fig. 1. Design flow of Related Articles Selection based on Inclusion and Exclusion criteria.

Fig. 2. Systematic Review Approach.

sensitive data, and accessing private information. To address cyber systems.


threats, the most critical approaches apply defensive strategies. They Emerging communication systems motivate learning analysis to
always use preventive solutions to prevent unauthorised network access make the applications more reliable and secure which can even detect
which develops an appropriate communication pattern to minimize any anomalous behavior to prevent data leakage and breaches. Detect­
system loss, processing power, and storage capacity. However, IoT ap­ ing any anomalous behavior necessitates high accuracy and efficiency to
plications still experience an inadequate solution including latency standardize the process of centralized server and edge computing sys­
constrained to meet the desired requirements of the communication tems. However, massive data computing and sharing are still regarded as

3
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

inefficient due to privacy and communication costs. It is worth noting Identify research gaps: This survey rigorously reviews various
that preserving the privacy of IoT devices demands a proper trade-off to research articles and identifies gaps based on the performance metrics.
address the challenges of the networks against malicious cyber activ­
ities. As a consequence, robust research is needed to highlight the issues 1.2. device security in iot applications
of centralized security and device authentication. Ogonji et al. [6]
comprehensively reviewed the security and privacy perceptions of IoT The current IoT trend so-called connect the unconnected objects
applications to present a taxonomy of IoT threats. Stoyanova et al. [7] deals with smart computing objects comprising sensing units and pro­
summarized the main issues involved in IoT-based forensic in­ cessing power to associate with end computing systems which may
vestigations. Sikder et al. [8] presented a detailed study on sensor-based aggregate the data via wide area networks to fulfill the transmission
security and threats to provide a formal taxonomy and to perform an requirements of the application systems. The computing systems up­
effective analysis of the vulnerability metrics. Mousavi et al. [9] iden­ grade the trade-off efficiency to interconnect the common objectives of
tified a few significant characteristics such as existence, self-identity, industrial and commercial sectors which understand the challenges of
communication, interaction, and dynamicity to interrelate the intelligent systems. Of late, tremendous efforts have been initiated to
computing objects equipped with cryptographic algorithms to secure the cover the scope of security-related issues in modern IoT. In modern IoT,
communication channels. Mirzaee et al. [10] evaluated the novel cyber the major factors drive security vulnerabilities at a hardware level to
threats of smart grid networks associated with power systems to address assess different types of computing applications namely application,
the challenging issues of security and privacy. Samaraweera and Chang protocol, and network interface.
[11] reviewed different types of security mechanisms to identify and Exploiting the known vulnerabilities may set out a few counter­
evaluate the design issues of next-generation database systems. Liao measures against unsecured communication to resolve the loopholes in
et al. [12] explored the systematic behavior of edge computing systems the web interface and privacy breaches. Moreover, security patches and
and IoT to analyze security and forensic issues. Including confidentiality updates are firmly concerned to protect the networking systems against
and integrity of data. adversaries and to institutionalize the operating systems to handle the
Have the above implication and countermeasures been considered? severity of the risks such as data loss and denial of service. Most systems
What are the security issues handled in IoT to achieve better perfor­ distribute their network of physical objects through the protocol level to
mance efficiency? What are the futuristic technologies chosen in prac­ connect and exchange data with another computing device via a dedi­
tice to analyze the behavior of computing systems? What are the cated network connection. However, in most cases, the computing sys­
challenging issues being encountered to protect the privacy of tems rely on the transmission protocol to share the user credentials with
computing systems? In order to drive these practical implications, the four distinct components including sensors, device connectivity, data
applications of IoT and their relevant technologies were collected and processing, and network interface. The major significant attributes are
analyzed with three distinct aspects: 1. Examine the security mecha­ as follows:
nisms of the computing device namely cyber threats and key agreement; Unsecured Network Infrastructure has an unpatched vulnerability
2. Analyze the data features of the computing device such as integrity locally or globally to target the communication of IoT systems that gain
and confidentiality; and 3. Explore the privacy compliance and trust­ unauthorised access to identify the weaknesses of IoT devices.
worthiness of IoT to understand the characteristics of physical layer Unsecure Communication Protocols find insecure communication be­
security. Thus, in this survey, three basic aspects are extensively orga­ tween the computing devices to authorize and access the authentic data
nized to carry out a detailed analysis of the strengths and weaknesses of causing a high degree of vulnerability in modern IoT.
security frameworks. They are as follows: Inefficient Data Encryption takes access control of the network traffic
to read or process the encryption algorithms to decode the original
1. Why authentication and key agreement mechanisms are much contents.
necessitated to solve the security and privacy issues of IoT Isolated Process and Unauthenticated Scanning allows networking
applications? systems to access or explore the IoT applications to inspect the behavior
2. How the authentication and key agreement mechanisms are applied of the target applications
in IoT devices such as inference, knowledge, and possession to verify Access Control and Device Identification exploit the known vulnera­
the device identity and to create a robust session? bilities to access the shared data which determines the mode of action
3. What are the formidable challenges and IoT trends embedded with without authorized logging in controlled by a remote procedure call
intelligent sensing powered by smart computing to connect and ex­ using configured credentials.
change sensitive data with other computing devices? Credentials Management Systems issue and manage the system cre­
dentials using public key infrastructure to evaluate the performance of
Identify Database: Published academic research articles and jour­ credential-based computing systems.
nals can be obtained using various online databases, including Scopus, Of late, thousands of insecure devices are predominantly affected by
Web of Science, Science Direct, Google Scholar, PubMed Central, and Botnets and came into DDoS attacks. Every IoT system can be a weapon
Research Gate. and target several rude attacks. Moreover, manipulating IoT systems can
Find Keyword: Keywords used to search the relevant topic/article be another major security threat [13]. The Internet of Things coins that
using "Securing the Internet of Things Environments," "IoT," "Security the "S" corresponds to security. However, every business’s use of IoT
and Privacy in IoT," and "Authentication schemes for IoT Environments." devices has enormously increased to multiply the number every year.
Time Stamp: It defines the selection of research works in the speci­ Ultimately the entire data en route from various deployed sensors,
fied time duration. In this survey, we have considered the research cameras, implanted devices, and voice assistants onto a connected
works from 2010 to date. system.
Name Exclusion Criteria: This survey specifically focused on Conversely, the IoT device security mechanism has failed in regu­
research articles published in English. However, we also consider blogs, larizing the device adaption [14]. Therefore, the modernistic IoT
news, white papers, forums, and other related media for IoT security. research directions have been exhaustively changing from necessity to
Search and Record: Most of the authentication schemes have been safety. Besides, the idea of safety-centric IoT-based solutions aimed to
considered to review their mechanisms. Every article is reviewed and diminish uncertain scenarios and problems. Currently, various case
records the author’s information, publication, goal, and contributions studies have reported on the critical consequences of IoT on several
tabularly. Also, we categorize every article based on its type and applications. For instance, autonomous and self-driving connected ve­
performance. hicles in industries keep laborers away from hazardous places.

4
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Resultantly, in monitoring various environmental conditions such as air IoT infrastructure to address crucial issues of application software and
pollution levels, chemical leaks in the water, toxic gasses in smoke, and protocols and to mitigate the risk involved in industrial IoT. Over a
water pressure in pipelines to monitor water flow, etc. decade, the world has rapidly witnessed the implications of the security
Furthermore, these IoT systems can facilitate people with notifica­ vulnerabilities inheriting the assessment features of industrial IoT such
tions of activities, thus monitoring and controlling resource consump­ as device hijacking, spoofing, and distributed denial of service. The
tion utilization [15], making today’s lives easier. Generally speaking, assessment features additionally include four core elements such as
IoT plays a vital role in people-centric applications, which provide intelligent assets, data communication, analytics, and applications to
various solutions based on enterprise requirements. For instance, to evaluate the device constraints (i.e., computation power, energy ca­
diminish the response time while reacting to unexpected health issues, pacity, and physical dispersion). The intensive research work discovers
including child death symptoms during sleep, increasing the daily needs the state-of-the-art approaches in modern IoT to envision the challenges
of aging, and physically challenging people from sudden situations. of the network infrastructure registered within the coverage region of
Resultantly, implantable devices bring monitoring services, enabling the the system gateway.
alert system to improve emergency cases’ survival rates [16]. Currently, the modern IoT is playing a crucial role in addressing the
Moreover, IoT can also be responsible for providing every device broad aspects of convergence technologies, including healthcare, smart
with identification and communication with other devices. However, grid, smart farming, intelligent transportation, smart cities,
these devices can collect data, analyze, and make decisions without manufacturing, aerospace, supply chain, etc. It has several technical,
human intervention. Therefore, these devices’ limitations raise several political, and socioeconomic aspects to address challenges such as se­
challenges, such as connectivity challenges for many devices to establish curity, privacy, and risk assessments in IoT. It highlights the threat
communication with others and security challenges in conjunction with models to administer real-time entities’ activities, including information
protecting IoT networks from various attacks. Hence, security is the security, infrastructure, platform development, storage processing, and
above requirement to safeguard its hardware, connected networks, and management. This study focuses extensively on authentication and key
IoT applications. Moreover, various conventional forms such as micro­ agreement mechanisms to evaluate the multicriteria techniques, such as
grids to allow distributed energy resources, self-driving cars to enable two-factor, three-factor, multi-factor, etc. Authors in [19] presented a
the autonomous vehicular system, and smart city drowns to permit survey concerning major research studies conducted for IoT application
surveillance mechanisms. These systems even depend on standard Su­ systems. Recent review works [7,20–24] focused on various smart
pervisory Control and Data Acquisition (SCADA) Mechanisms. Fig. 3 application systems’ security challenges and issues. Thus, in this survey,
depicts the taxonomy of emerging IoT application domains. we cover major viewpoints of modern IoT applications to conduct a
Further, integrating these physical domains with cyber domains rigorous study on security and privacy issues. Fig. 4 shows the contri­
raises the disclosure of various attacks’ successions. Subsequently, butions and structure of the survey paper.
SCADA supervisory control mechanisms can be targeted with critical
cyber-attacks resulting from incapacitating the physical devices, which - We demonstrate a rigorous review of the most up-to-date methods
affects the supervisory control systems [17]. Indeed, IoT security and that address the issues of modern IoT applications’ including security
privacy are significant difficulties while connecting with its network. and privacy.
Various security requirements have been studied, including confidenti­ - We present a comprehensive study on state-of-the-art technologies to
ality, integrity, mutual authentication, proper session key management, relate to the security requirements of IoT environments.
and perfect secrecy [18]. Specifically, authentication is the most - We review several authentications and key agreement schemes to
important security need for IoT environments to establish reliable address the current challenges in smart IoT.
network communication and secure data transmission.Scope of the - We have rigorously explored the security requirements, services,
Survey threat model, and potential attacks.
Modern IoT device has been demonstrated to be more susceptible to - Finally, we evaluate the security measures of key management to
critical infrastructure systems that can compromise the IoT devices to discuss open issues and effective countermeasures.
launch massive security attacks against emerging technologies. The
development of computing methodologies realizes the significance of The remaining paper can be structured as follows: Section II

Fig. 3. Taxonomy of emerging IoT application domains.

5
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Fig. 4. Major contributions of the paper.

discusses the detailed research background and state-of-the-art ap­ machinery, network components, servers, cloud, and application soft­
proaches for IoT environments. Section III explains the phases of the ware are all available to satisfy the requirements of end-users. To fulfill
authentication process to understand the core features of application the legal limits of smart manufacturers, it also includes sensing, aggre­
domains. Section IV reviews several authentication schemes based on gation, network, server/storage, access, and management.
network models, cryptographic operations, and primary goals. Section V Usually, the sensor node manages the data for a certain area, and the
analyses three basic key assessments such as security requirements, collected data can be transferred to the gateway via a wireless
application services, and potential challenges. Section V1 describes communication channel. The gateway has more powerful capabilities,
various counteractants and performance analyses. Section VII shows whereas the sensor node can be a resource-constrained device with
various research challenges and open issues in IoT environments. Sec­ minimal computing power, storage, and resources. In various applica­
tion VIII concludes the review work. tions of WSN, including remote health care, users must be able to access
sensor data via a mobile device. Thus, the user’s identity can be a sig­
2. background nificant security challenge for WSNs. Trusting the devices in a WSN for
the IoT can be critical to make the network well-function. Even a single
2.1. iot: the state-of-the-art compromised node can turn malignant and trigger catastrophic failures
throughout the system [25]. The scheme’s purpose is that any two
The IoT refers to the environment where physical devices are parties (user, gateway, and sensor) to communicate. The WSN can suffer
coupled to interconnected networks and cyber-physical systems to offer from malicious attacks because of the open characteristic of wireless
diverse services. Its goal is to create intelligent systems for managing communication channels [26].
numerous applications like smart farming services, healthcare, supply Furthermore, the sensor node’s resource limitation does not support
chain, and smart industrial systems. To digitize the process of physical public-key cryptographic algorithms, including RSA, especially for
things, it collaborates with customers and business partners [8]. Sensors, WSNs. The security functionalities of IoT majorly depend upon the
actuators, and networks are trained to visualize the production flow, different types of applications that it serves. The necessity for integrity
allowing the system to make definitive decisions. Sensor devices, and confidentiality might be precisely related to the application’s

6
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

security requirements. In addition to key management, user authenti­ capacity. As a result, data security is required to deal with memory leaks
cation is an underlying security mechanism to verify the users’ validity or other data threats.
between the entities connected in the network. Recently, various Aggregation Layer: It connects intelligent hardware to the sensor or
authentication and key agreement schemes have been proposed to controls the mechanical system, such as RFID, sensors, and actuators. It
address the security needs of WSNs. In the recent past, extensive can feed real-time data regularly to ease the automated process that
research has been carried out, especially to enable the quality of services connects the server or storage to send or store sensitive data because
in IoT environments. Various review articles have highlighted security physical devices limit the sensors to use dedicated operating systems
and privacy issues relating to communication, location, and data pri­ [53] like Contiki, TinyOS, RIOT, etc. It uses IoT-OS as a distributed
vacy. The authors [27–34] have produced extensive reviews concerning platform to control software and hardware while allowing for central­
various security and privacy issues in IoT environments. Authors in ized management.
references [35–47] have produced extensive reviews based on crypto­ Network Layer: It is an important aspect of the infrastructure in IoT
systems for sensor networks. Various cryptosystems have been consid­ architecture. It is responsible for addressing and routing data packets
ered based on asymmetric and symmetric [48] and lightweight sent from one location to another using an IP address. The standard
cryptographic mechanisms [31–34,49–51] to increase the security effi­ protocols for the network layer are IPV4 and IPV6. Because IPV4 has
ciencies of WSNs. reached its limit and is no longer capable of processing transmissions
with the scalability required by IoT applications, the IPV6 standard has
been established to provide adequate address space to support many IoT
2.2. iot architecture devices. For IoT device communication systems, a combination of short-
range and internet communication technologies has been deployed.
The IoT has distinct ways of connecting devices, including a standard Bluetooth and Zigbee are real-time examples of short-range communi­
Internet connection, including M2M and H2M alternatives. H2M and cation technologies primarily used to send data between physical de­
M2M mechanisms support various applications to locate, identify, track, vices and the nearest gateway based on communication channel
control, monitor devices, and transmit data [52]. According to recent capacity. Internet communication technologies that transfer informa­
advancements in IoT, researchers have categorized IoT architectures tion over long distances include Wi-Fi, 4 G, and 5 G [54].
into six types. (a) Typical Three-layer, (b) Middleware based, (c) Service Layer: It is one of the specialized layers responsible for
Service-oriented based, (d) Five-layer, (e) Cloud and Fog-Edge based, authorizing and disallowing data services of the user’s application and
and (f) Social IoT architectures. Fig. 5 depicts the collaborative layered device apps, depending on the necessity for IoT infrastructure. Business
IoT architecture. logic, service division, service integration, service implementation, and
Perceptron Layer: It describes how data is collected from sensor service repository are all part of the service layer. Furthermore, albeit
devices and delivered to the network layer. A set of internet-connected IoT devices have limited storage space, cloud storage is a crucial service
devices could communicate through a wireless communication channel layer component. As a result, this layer’s cloud storage security features,
to identify, detect, gather, and improve data services in this layer. Every including availability, immutability, scalability, and verified access.
sensing device should be connected to the internet. As a result, it can Likewise, this layer enables secure end-to-end data transfer between IoT
gather data from sensing devices and transmit it via a secure wireless devices and applications, including authentication, authorization,
communication channel. Every IoT device requires a unique identity identity, encryption, remote provisioning and activation, buffering,
(ID) to realize the alleged nature of the device present in the distributed synchronization, scheduling, group communication, and device man­
network. The data transfer can occur over a wireless communication agement [55]. This layer combines a centralized network with the
channel from a variety of locations. Data protection is essential for application, operating system images, and private data to give a reliable
monitoring and reporting intrusions. Currently, the perceptron layer’s service.
major security issues include protecting objects from unauthorised ac­ Application Layer: It is one of the four-layered IoT architectures’
cess, unknown objects, DoS attacks, and routing assaults. Besides, an underlying layers, where data is retrieved, processed, and visualized.
unauthorised device should not operate in the place of an unauthorised The system first scans the requester’s node to identify the requester,
user. In addition, the sensing source has a low processing and storing

Fig. 5. IoT Layered Architecture.

7
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

after which the data can be securely stored in the cloud for analysis. It is in Fig. 7[A] – [E].
unnecessary to put up any additional server components for big data System Setup: In this phase, all the protocols required for the entire
processing because of the dispersed nature of IoT. Furthermore, the IoT protocol can be fetched from the gateway/base station.
is causing a significant increase in the link of physical items, increasing Node/Sensor Registration: The gateway node must be registered
the use of smart devices across all application domains such as auto­ before deploying all the sensor nodes. Thus, the gateway keeps secret
mation, monitoring, and controlling [56]. However, managing IoT information about all of the nodes that have been deployed.
infrastructure and services is primarily concerned with security, privacy, User Registration: To obtain the sensor node data, the user must
and performance efficiency [57]. It has certain constraints in order to register with the gateway node to assure legitimacy. Initially, the user
meet the above-mentioned primary challenges: 1. The developed IoT needs to enter credentials like username, password/biometric secretly to
applications and services do not use standard technologies; 2. There are the gateway. The user is then issued secure secret cards or mobile de­
no standard network protocols for IoT-based application systems, such vices by the gateway node
as Wi-Fi, BLE, SigFox, LoRaWAN, and ZigBee; and 3. Resource usage in Login: The user’s login credentials are validated at this phase. A login
processing power, data storage, bandwidth, and computation is request has been sent and delivered for further action to the gateway
increasing [58]. node after successful validation.
Authentication: In this phase, initially, the gateway node validates
3. Authentication and key agreement schemes in iot the login request. The gateway node completes the request for authen­
environments tication to the presently accessed sensing node once the verification
passes. The sensing node can then confirm its findings, and the
Of late, the association between physical devices has exponentially authentication acknowledgement is sent to the user when the message is
increased, which prevailed. Various authentication schemes have been received. Finally, the user the data from the sensor node is double-
introduced, especially to improve security efficiencies in the Network of checked. A session key can only be created among the user and sensor
the Internet of Things (N-IoT) [59]. To analyze real-time data in the nodes when mutual authentication has been completed. As a result, both
physical world, the N-IoT has limited storage space and computational entities can communicate securely using the session keys.
power. Therefore, a lightweight mechanism with low-cost sensor nodes Password change/update phase: this can be essential only if the user
is highly preferred to develop a secure and reliable authentication wants to update their passwords and biometrics. The user does not
mechanism. Similarly, remote user authentication schemes must pro­ interact with the gateway node in this phase because the password up­
vide standard security to withstand resource-constrained requirements. date can be done locally.
Besides, resistance to various well-known attacks includes reply attacks, User smartcard revocation phase: this phase could be required when
smart card lost/fraud attacks, password guessing/detection, identity an attacker loses or steals the smartcard. The revocation phase can
verification, offline guessing, sensor-node impersonation attacks, sensor establish a new smart card with updated login information using an
capture attacks, MITM attacks, and stolen attacks verifier attacks as authentication mechanism.
shown in Fig. 6. Dynamic node addition: this phase requires the addition of some
Therefore, as security becomes a challenge for WSNs, secure and nodes that are physically captured by an assailant, while others are
efficient authentication schemes are highly demanded. According to fatigued due to battery failure.
various surveys, we found several authentications and key agreement
schemes for enabling secure communication between connected de­ 3.2. secure authentication scheme for iot environments
vices. This study presents a thorough examination of several authenti­
cation systems for different sensor networks in the following Lamport (1981) introduced a password-authentication scheme over
subsections. Also, we make the state-of-the-art comprehensive survey unsecured communication [61]. Since then, numerous user authenti­
emphasize various authentication schemes and their functional cation schemes like Identity-based, password-based, two-factor, three-­
requirements. factor, and multi-factor mechanisms have been entered to examine
security, computation, communication, and storage efficiencies. Zhu
3.1. phases of authentication schemes et al. [62] initially proposed a smartcard-based wireless security scheme
with user anonymity. According to Lee and Hwang, the Zhu et al.
The user authentication mechanisms in IoT have the following technique could not provide reciprocal authentication susceptible to
phases [60]. A typical process of authentication mechanism is depicted forgery attacks. Besides, Lee et al. [3] extended the Zhu et al. scheme to

Fig. 6. Understanding Authentication Mechanism Procedure in IoT Environments.

8
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Fig. 7. [A] System Setup / Initialization Phase. [B] System Registration Phase. [C] System Authentication Phase. [D] Secret Key Update Phase. [E] Revocation / Re-
registration Phase.

9
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Fig. 7. (continued).

address the identified issues. Authors in ref [4] demonstrated that Lee
et al. technique cannot offer sufficient user anonymity to withstand a
forgery attack. Thus, they proposed an improved version. Subsequently,
Pickering et al. [5] observed that Chang et al. scheme could not provide
user anonymity to withstand attacks like impersonation, smartcard
stolen, sensor node spoofing, and stolen verifier attacks. As a result,
Pickering et al. presented an unlinkable authentication scheme to
address the weakness of Chang et al. scheme. Figs. 8 and 9 depict various
research articles published between 2014 and 2023 for the search

Fig. 9. Number of papers published [Index – Authentication and


Key Agreement].

keywords (1) security and privacy, and (2) authentication and key
agreement for IoT environments.

3.3. authentication schemes for WSN

Usually, WSN gather a large amount of sensitive information from


Fig. 8. Number of papers published from 2014 to 2023 [Index – Security various nodes. The remote operation of sensor nodes broadens their
and Privacy]. exposure to malicious attacks, including DoS/DDoS, sensor node key-

10
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

impersonation, password key updates, smartcard stolen attacks, and As a result, an improved biometric-based authentication framework
many more. To protect WSNs from various security attacks, a secure, and a key-agreement mechanism were developed, which is particularly
robust, and highly accessed authentication scheme can be required. Das useful in multi-server scenarios. Amin et al. [43] devised an
[58] designed smartcard-based and password-based authentication anonymity-preserving 3FA with a key exchange scheme to withstand
schemes, especially for WSNs, to demonstrate that their scheme can be SSTPI attacks. But recently, Singh et al. [76] analyzed the scheme of
less vulnerable to various potential attacks. Unfortunately, He et al. [63] Amin et al. system and discovered that it has session leaks and is
showed that the Das scheme cannot resist three primary attacks: vulnerable to offline guessing attacks. Singh et al. demonstrated a robust
privileged-insider, key impersonation, and secret essential disclosure. authentication mechanism for WMSN using MAC functions and sym­
Consequently, their scheme provides enhanced security against Das [58] metric encryption to overcome these issues. Their scheme adopts
scheme to protect from such vulnerabilities and declared that their OTCODE as a one-time activation code that is more secure than using a
scheme could prevent several security attacks. password. Their scheme provides a low-cost and fast authentication for
In 2010, Kahn et al. [64] found the Das scheme’s security weak­ real-time use.
nesses: lack of password key-update and mutual authentication. An Wireless communication technologies are becoming highly
improved version to prevent the above issues was presented, which is demanding, primarily utilized in various applications, including IoT,
better than the Das authentication scheme. Chen et al. [65] proved that vehicle tracking, health care, and cloud computing environment. With
Das [58] scheme could not resist various potential attacks. Therefore, the help of WSN, a vehicle driver can access several useful information
Chen et al. proposed an enhanced mutual-authentication mechanism for for comfortable driving circumstances including vehicle speed, acci­
WSNs. Vaidya et al. [66] described that [58,64,65] schemes are entirely dents, emergencies, and traffic congestion. As a result, because infor­
free from sensor node impersonation, smart- card stolen, and other at­ mation can be transmitted over a public channel, a driver or traffic
tacks. To withstand these attacks, Vaidya et al. designed a robust controller may be subject to various attacks. Hence, vehicular commu­
authentication system for WSNs. Hsieh et al. [67] and Kim et al. [68] nications are becoming exposed, as well. To withstand these issues,
demonstrated that the Vaidya et al. system was vulnerable to hostile secure and robust mutual authentication mechanisms are highly
insider assaults, MITM, DoS/DDoS, Offline password guessing, and demanded. Mohit et al. [44] designed a secure authentication technique
impersonation attacks. Subsequently, their work produced an enhanced employing WSN for vehicular communication to achieve reciprocal
authentication scheme to resist these vulnerabilities for WSNs. Turka­ authentication. Then Yu et al. [77] described that Mohit et al. authen­
novic et al. [69] and Yuan et al. [70] designed a robust authentication tication scheme could not withstand desynchronization, MITM, session
mechanism for WSNs based on IoT. Their schemes suggested a key agreement, secure mutual authentication, and useranonymity. To
hash-based authentication technique for various ad hoc WSNs to provide prevent the above flaws, they devised a novel secure
efficient security measures. Hence, their method claimed that the mutual-authentication scheme for vehicular communications. Shim
designed protocol is safe against several malicious attacks and provided et al. [78] devised an advanced, reliable- authentication scheme, chiefly
a password change facility, password protection, mutual authentication to secure vehicular sensor networks, and stated that their scheme could
among all parties, and dynamic node addition. On the other hand, Chang withstand various attacks including chosen-message attacks (CID-CMA).
et al. [71] mentioned Turkanovic et al. [69] scheme could not resist user Subsequently, Liu et al. [79] described that Shim et al. [78] scheme does
impersonation, smartcard loss, sensor node spoofing, and stolen verifier not prove that this scheme can secure a weaker attack level, including
attacks. Their work suggested a novel remote-authentication mechanism the no message assault and adaptive chosenidentity (CID-NMA).
tailored to WSNs to avoid security flaws. Fig. 10 depicts the authenti­ Therefore, Liu et al. [79] used a different approach and proposed an
cation system for cloud-enabled IoT environments. enhanced scheme to secure against CID-CMA.
Subsequently, He et al. [72] and Farash et al. [73] described a few
vulnerabilities in the Turkanovic et al. [69] mechanism, such as a stolen 4. analysis of authentication schemes based on network models
smartcard, user traceability, secret and session keys, key-impersonate
disclosure, and key-impersonate and MITM attacks. As a result, their This section reviewed several authentication schemes based on
scheme defines a robust authentication system to defeat the Turkanovic network models, cryptographic operations, and primary goals, including
et al. [69] system complications. Subsequently, Lu et al. [74] Secure Authentication; Key Management; Formal Security Analysis
crypt-analyzed the Amin et al. mechanism and proved that it could be Lightweight; Efficient; 2FA; 3FA MFA. Network models include WSN for
susceptible to user impersonation, session key temporary information, medical things, vehicular things, multimedia networks, industrial
and offline/online password-guessing attacks. Therefore, their scheme things, body area networks, and multi-gateway networks. Table 2 and 3
claims to be highly secure and robust for WSN environments. Conse­ depicts various authentication schemes and their cryptosystems for
quently, Li et al. [75] proposed a 3FA anonymous authentication strat­ distinct sensor networks. Most of these existing authentication schemes
egy for WSN-IoT that uses a fuzzy commitment scheme to handle the were designed with the help of secure hashing, password-based, bio­
user’s biometric data. Also, Li et al. assured the proposed scheme metric-based, bitwise XOR, smartcard-based, and ECC cryptographic
withstands several known attacks and obtains certain functionalities. solutions. The references in [39,51,73] achieved better security features,
whereas schemes of [40,44,74] could not achieve common security
features, including secure key management and efficiency. However,
most of these schemes failed to prove lightweight authentication and
efficiency because of their cryptographic primitives and deployment
environments.
Consequently, authors in reference [47,80–99] have designed their
authentication schemes to withstand known attacks, achieve efficiency,
and secure session key management. However, these schemes do not
provide high-level security as most schemes could not use multi-factor
authentication except for reference [86]. The authors in reference [47,
86,94,97,99] not achieved lightweight authentication, whereas authors
in reference [36,38,49,51,70,80–85,87–93,95–98,100] achieved light­
weight authentication. Besides, formal verification plays a vital role in
an authentication scheme to determine a high level of security. The
Fig. 10. Authentication for Cloud-enabled IoT Environment. authors in references presented in Table 3 have formally verified except

11
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

the schemes in [36,44]. The authentication and key agreement schemes elliptic curve. Also, this primitive extends its property into an elliptic
provide better security functionalities if they formally and informally curve Schnorr multi-signature to modify the signed property at least by
verify all requirements. Thus, these verification methods show the in­ 2
3 n + 1.
abilities of the proposed security mechanisms. The verification of the
security mechanisms depends upon the threat model. 4.2. threat model

According to the Dolev Yao threat model, various adversary capa­


4.1. cryptographic primitives
bilities and direct implications have been determined [109]. This model
can estimate security efficiencies. The threat model helps find the ad­
Most cryptographic primitives categorize the algorithm into primary
versary capabilities performed on the specified security algorithms
and optional to perform a systematic operation functionalizing the
working on insecure communication channels. This section also dis­
property of security and privacy. The former primitive includes cryp­
cussed the threat model for various security mechanisms considered for
tographic hashes and standard digital signatures to ensure better veri­
advanced IoT environments. We found more than twenty-five attacks
fiability and confidentiality of data whereas the latter enhances the
that commonly affect IoT environments analyzed and prevented by
privacy and anonymity of IoT-based applications. Moreover, the other
various security schemes for advanced IoT applications. The high-level
cryptographic primitives deal with secret sharing and seamless transfer
threat model specifications are depicted in Fig. 11.
to construct the theorems using zero-knowledge proofs. Unfortunately,
The popular assumptions are as follows:
the standard encryption cannot be applied directly in any IoT applica­
tions to construct a reliable commitment protocol using ring-based sig­
1. Since the communication between two entities is in an insecure
natures. In order to classify its functionalities, this survey
wireless communication channel, an adversary can then impersonate
comprehensively evaluates the significance of cryptographic solutions.
and eavesdrop on the original messages transmitted on public
Hash Function [101] is a cryptographic algorithm mapping the
networks.
arbitrary size of data into a fixed size of the data string. This function
2. An adversary can physically capture multiple sensors set up or
includes two basic requirements such as one-way and
implanted in a hostile environment and then collect all the sensitive
collision-resistance to make the computation infeasible. The former
information stored in it using side-channel or differential power
function ensures the property of invertible whereas the latter implies the
attack scenarios [109].
same hash values for two given inputs. Assume a hash function with n −
3. An adversary may attempt to listen to the activity of a lawful user to
bit data out, then the complexity of finding a collision is determined as
gain access as long as public networks highly influence the security
O (2n ) by brute-force attack and as O (2n/2 ) by birthday attack. As a threats.
consequence, the output of the hash function is said to be at least 160 − 4. An adversary can steal or lose a smartcard to obtain sensitive infor­
bits in order to ensure at least 80 − bit level of security mation stored on the card [110].
Digital Signature [102] is another algorithm with the feature of 5. An adversary may recapitulate Cartesian pairs and their products, i.
inevitability to ensure the properties such as non-repudiation, integrity, e., N ID × N PWD in polynomial time where N ID and N PWD
and authentication. In a digital signature, the standard security is so indicate identity passwords of connecting nodes [110].
existential to guarantee a robust signature and cannot use any new
message to forge a valid signature. The signature schemes so-called 5. key assessments: security requirements, services, and
elliptic curve digital signature algorithm (ECDSA) [103] and Edward challenges for iot environments
curve digital signature algorithm (EdDSA) [104] use the hardness of the
elliptic curve version to improve the security efficiency. Most impor­ Due to the extensive use of IoT infrastructures including, sensors,
tantly, EdDSA is already recommended as a new elliptic curve genera­ actuators, mobile devices, and embedded devices can transmit huge
tion of transport layer security as it has a plane model of elliptic curve
cryptography.
Ring Signature [105] is a new concept of crypto-primitive addressing
the issue of anonymity. In order to prove pseudonymity, application
system like Bitcoin applies blind signature and group signature which
shares a signed message on behalf of other group members without the
provision of permission privilege. This primitive categorizes its property
into unlinkability and untraceability to enhance the property of ano­
nymity. The former can not find any identity of the signer whereas the
latter cannot make the signer to decide the virtue of two or more sig­
natures. Moreover, unconditional anonymity shows the significance of a
strong security notion to achieve perfect privacy protection in connec­
tion with the behavioral process of individual signature.
Ring [One Time] Signature [106] signifies the use of a one-time
signature. This process can securely use the signed key but can be
done only once. Otherwise, it would reveal the signed key. Most
computing devices use this strategy to construct encryption and key
agreement mechanisms.
Ring [Borromean] Signature [107] shows an abstract view of the ring
signature to achieve efficient storage and less communication cost. In
addition, this signature uses a monotone Boolean function to express the
knowledge of the given group. This primitive function considers the
signed key as the given attributes to model the structure as a tree-like
access to determine the multiple signatures anomalously.
Multiple Signature [108] is a signature primitive that has the same size
as a regular one to instantiate the standard Schnorr scheme over an Fig. 11. High-level threat model.

12
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

information. In this context, protecting the privacy and security of which two parties are authenticated and the entities in a communica­
collected information is critical. Furthermore, with the extensive tions link authenticate each other.
development of wireless communication technologies, tiny mobile de­ Sensor Anonymity must provide user/sensor anonymity to safeguard
vices have become prevalent to access the internet. The advancements users’ real identities. It should not be exposed to any other entity except
bring mobile devices increasing limited access to worldwide access to the trusted server.
including online shopping, online payments, mobile banking, e-services, Perfect forward security is one of the best features of key agreement
etc. These advanced technological aspects bring convenience to the end- protocols. It guarantees the session keys that it cannot compromise, yet
user. the server’s private key is compromised. Also, it protects previous ses­
On the other hand, as wireless connectivity increases, the attack risk sions against future attacks on session keys and passwords. By using
also increases. Thus, enabling security will become an essential aspect of SSL/TLS, it can further protect the data on the transport layer network.
advanced IoT communication entities. Besides, security and privacy The compromised single session key [125] cannot affect any data except
have attracted research attention in various complex domains over the the data exchanged with that private key.
decades. As a consequence, various security schemes have been imple­ Untraceability has any internal user not connecting any two
mented, especially for IoT environments. Each security solution must authentication sessions. In other words, an authenticated person need
follow various security requirements to ensure the efficiency of the se­ not be authenticated with their identity in the same session with the
curity protocol [111]. Table 1 depicts recent surveys and their goals. same user.
However, most security protocols may fail to provide all security fea­ Session Key Establishment crucial to enhance the security features
tures based on the application design and implementation. Thus, a few of the protocol which is well constructed to ensure session security. The
security mechanisms may efficiently work for lightweight systems but members’ identities and roles must be resilient to unknown potential
may not withstand several known attacks. This section provides an key-sharing attacks. Imposing unique session identifiers ensures the
extensive summary of various security services, security concerns, is­ session key will be fresh. Few other short or long-term static shared keys
sues, and IoT environments’ challenges. Table 4 depicts various security depending upon individual protocols ensure Only standard members
services that require for the development of IoT applications. have access to the session key [126].
The session-Key agreement transfers the session key between the
medical professional and patient to secure communication in WMSN
5.1. security services during a specified period.
Known-Key Security has an attacker who cannot compromise
Mutual Authentication works for gaining acceptance in both ways in

Table 1
Summary of recent related surveys and research goals.
Paper Year Contributions Goals
G1 G2 G3 G4 G5 G6

Ferrag et al. [27] 2017 – In a comprehensive study on authentication mechanisms IoT, more than forty authentication protocols ✔ ✔ ✔ ✔ ✖ ✔
in various IoT contexts such as M2M, IoV, IoE, and IoS, have been examined.
– Besides, Authentication mechanisms have been presented with threat models, countermeasures, and
formal verification methods.
Sfar et al. [31] 2018 – Presented a novel cognitive approach to IoT security. ✖ ✔ ✖ ✔ ✖ ✔
– Described the taxonomy of IoT framework, research challenges, and solutions
Das et al. [32] 2018 – Authentication and safe key management are included in the taxonomy and analysis of security methods ✖ ✔ ✔ ✔ ✖ ✔
for the IoT.
– Recent state-of-the-art techniques for security protocols are presented.
El-hajj et al. [24] 2019 – Provides a complete, up-to-date view of IoT authentication mechanisms. ✖ ✖ ✔ ✔ ✔ ✖
– Compares and assesses proposed authentication techniques, highlighting their advantages and
disadvantages.
Kavianpour et al. 2019 – Systematic literature review of authentication in IoT for heterogeneous devices ✖ ✔ ✔ ✔ ✖ ✔
[29] – Provided a multicriteria classification of existing authentication mechanisms
Nandy et al. [30] 2019 – Focused on IoT security, especially for authentication schemes. ✔ ✖ ✔ ✔ ✖ ✔
– Provides a systematic approach to verification and evaluation methods of IoT authentication schemes
Somasundaram et al. 2020 – The systematic review of various security solutions in IoT for Medical Sensor Networks ✔ ✖ ✔ ✔ ✖ ✖
[33] – Provides the analysis of various security issues and risk factors of security issues in IoMT.
Mrabet et al. [34] 2020 – Addressing the lack of standardized lightweight encryption techniques, a novel compact and optimized ✖ ✖ ✔ ✔ ✖ ✔
layered architecture for IoT is described.
– He addressed the importance of security requirements, including authentication, authorization, access
control, and encryption protocols.
Ferrag et al. [28] 2020 – Authentication mechanisms for smart mobiles. ✔ ✔ ✖ ✔ ✔ ✔
– Provides counteractant classification based on four methods, including cryptographic, channel
characteristics, classification algorithms, and personal identification.
– Provides the open challenges and future research directions
Mousavi et al. [9] 2021 – Cryptographic mechanisms for IoT environments ✖ ✔ ✔ ✔ ✖ ✖
– Addressed security algorithms based on security factors
– Demonstrated the importance of ECC-based cryptographic mechanisms to minimize memory
requirements and execution time.
Our Paper 2022 – Authentication and key management scheme and analysis of security methods for the IoT domain. ✔ ✔ ✔ ✔ ✔ ✔
– Systematic literature review of authentication in IoT for heterogeneous devices
– Addressing the lack of standardized lightweight encryption techniques
– Recent state-of-the-art techniques for security protocols are presented.
– Focused on IoT security, especially for authentication schemes
– Addressed security algorithms based on security factors
– Provides a systematic approach to verification and evaluation methods of IoT authentication schemes

G1: Threat Model; G2: Counteractants; G3: Security Analysis; G4: Authentication Mechanisms; G5: Security Systems; G6: Open Issues and Research Directions ✔:
Supported; ✖: Not Supported.

13
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Table 2
Taxonomy of authentication schemes and their cryptosystems for different sensor networks.
Existing Primary Goal Cryptographic operation Target Objectives
Schemes Network SP1 SP2 SP3 SP4 SP5 SP6 SP7 SP8 SP9

[35] Robust ECC-based authentication scheme – Elliptic Curve Cryptography IIoT ✔ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✔


for preserving privacy for IIoT
[36] Lightweight MFA secure smartcard-based – Smartcard-based, Password- WSN ✔ ✔ ✖ ✔ ✔ ✖ ✖ ✔ ✖
remote user authentication for cloud-IoT based
applications – Secure Hash Function, XOR
Operations
[37] The robust and secure authentication – Secure Hash Functions, XOR Multi- ✔ ✔ ✔ ✖ ✔ ✖ ✖ ✖ ✖
mechanism for multi-gateway WSN in IoT Operations Gateway
deployments WSN
[38] Novel mutual authentication scheme for e- – Symmetric cryptography, WMSN ✔ ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✖
healthcare systems Smartcard
– XOR operations, The
cryptographic one-way Hash
function
[39] The secure and robust biometrics-based – Chaotic Map, Biometric based WSN ✔ ✔ ✔ ✖ ✖ ✖ ✔ ✖ ✖
authentication scheme for WSN
[40] The efficient, secure password-based – Password-based, Symmetric WBAN ✔ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✖
anonymous authentication mechanism for cryptography
WBAN
[42] Lightweight 3FA and key agreement – Secure Hash functions, XOR WSN ✔ ✔ ✔ ✔ ✖ ✖ ✔ ✖ ✖
mechanism for secure data transmission in operations
IoT networks – Biometric-based
[43] 3FA and key exchange scheme for – Smartcard-based, Secure WSN ✔ ✔ ✔ ✖ ✔ ✖ ✔ ✖ ✖
ensuring anonymity and privacy Hash functions
preservation in WSN – XOR operations
[44] Secure authentication scheme specially – The one-way collision-free WVSN ✔ ✔ ✖ ✖ ✔ ✖ ✖ ✖ ✖
designed for vehicular systems Hash function
– Bitwise XOR operations
[49] Secure, lightweight Authentication and – Bitwise XOR Operations, WSN ✔ ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✔
key agreement scheme for low capacity Secure Hash functions,
IoT devices Asymmetric encryption
[51] A lightweight and robust 2FA for – Secure Hash Functions, XOR WMSN ✔ ✔ ✔ ✔ ✔ ✔ ✖ ✖ ✖
healthcare systems Operations
[59] The remote user authentication – Secure Hash Functions, WSN ✔ ✔ ✔ ✖ ✖ ✖ ✖ ✖ ✖
mechanism for agriculture monitoring Smartcard-based
– Symmetric cryptography
[73] The secure, anonymous lightweight – Cryptographic one-way Hash Multi- ✔ ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✖
authentication mechanism for multi- Function gateway
gateway based WSN – Smartcard-based WSN
[74] The secure and robust user authentication – Elliptic Curve Cryptography WMSN ✔ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✔
mechanism for e-Healthcare applications
[112] Design an anonymity-preserving mutual – Secure Hash Functions, WMSN ✔ ✔ ✔ ✖ ✔ ✖ ✖ ✖ ✔
authentication mechanism for the patient- Bitwise XOR Operations
monitoring healthcare system

SP1: Secure Authentication; SP2: Key Management; SP3: Formal Security Analysis SP4: Lightweight; SP5: Efficient; SP6: 2FA; SP7: 3FA; SP8: MFA; SP9: Privacy
Protection;.
✔: Yes; ✖: No.

others’ session keys though an attacker tampers the session key. 5.2. Security concerns
User Anonymity hides the user’s identity information presented in
the system, including patients and medical professionals. WMSNs made This subsection describes various security concerns in line with IoT
a significant contribution to today’s medical field to improve the health environments.
care system’s quality. Since the data is extremely sensitive, exchanging Confidentiality is one of the essential security services of WSN. It
an insecure wireless communication channel causes a critical fault. ensures that the information has not been disclosed to any others, in
Loss of synchronization relates to the difference in delay between which the data can be accessible to only authenticated users. Public-key
the communicating devices and must be resilient. Otherwise, it leads to a cryptography is a well- known standard method to assure the integrity of
loss of synchronization. The time synchronization protocol design ac­ sensitive data. But this approach needs more resources when it comes to
complishes resource consumption minimization without experiencing computation and communication costs. Moreover, as the WSNs are
loss of synchronization issues [127]. resource-constrained, this approach cannot resist known Attacks. Thus,
Session secret key Agreement plays a critical role in ensuring its various security protocols have been proposed based on cryptographic
security while applying the session key agreement and cryptographic methods using symmetric-key cryptography for WSN [129]. It assures
algorithms. Cryptographic algorithms are classified as either symmetric the prevention of unauthorised users from accessing sensitive
(secret key/private key) or asymmetric (public key). Secret key cryp­ information.
tosystems can be viewed as the most common security mechanisms in Integrity ensures that the generated and received data cannot be
conventional computing systems as they are extremely fast and promise modified during transmission and storage. Maintaining and assuring the
to be secure. The secret session key agreement protocol enables the completeness of data preserve the energy constrained in IoT
shared key between two or more communicating parties to validate each applications.
other within the specified period. [128]. Authentication and authorization guarantee the IoT devices to
identify other IoT devices’ integrity intended to establish secure

14
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Table 3
Taxonomy of authentication schemes and their cryptosystems for different Networks.
Existing Primary Goal Cryptographic operation Target Objectives
Schemes Network SP1 SP2 SP3 SP4 SP5 SP6 SP7 SP8 SP9

[47] The untraceable robust mutual – One-way collision-free hash WBAN ✔ ✔ ✔ ✖ ✔ ✖ ✖ ✖ ✖


authentication mechanism for WBANs function
XOR Operations
[80] S-USI authentication for IoT‑based – Chebyshev Chaotic Map WMSN ✔ ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✖
eHealth systems
[81] Lightweight and privacy-preserving 2FA – Physical Unclonable Function WSN ✔ ✔ ✔ ✔ ✔ ✖ ✔ ✖ ✔
mechanism for IoT-enabled devices
[82] Lightweight authentication for M2M – One-way hash function, XOR, WSN ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✖ ✖
communication for IIoT environments operations, Pseudonym Identity
[83] Lightweight, secure 3FA for remote on- – One-time hash Function WBAN ✔ ✔ ✔ ✔ ✔ ✖ ✔ ✖ ✖
body networks are being used to monitor – XOR Operations, Pseudonyms
patients.
[84] Secure 3FA for smart healthcare services – ECC, XOR Operations, One-way WMSN ✔ ✔ ✔ ✔ ✔ ✖ ✔ ✖ ✖
Hash, USB
[85] Enhanced lightweight authentication for – One time hash chain, XOR WSN ✔ ✔ ✔ ✔ ✔ ✔ ✖ ✖ ✖
cloud-based IoT environments Operations, Pseudonym Identity
[86] Efficient MFA scheme for securing real- – One-way hash function, RSA WSN ✔ ✔ ✔ ✖ ✔ ✖ ✖ ✔ ✖
time data access in WSN Cryptosystem, Fuzzy extractor,
XOR operations
[87] Lightweight authentication for IoD for – ECC, One-way Hash, XOR WMSN ✔ ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✔
smart city surveillance operations
[88] Authenticated key agreement – One-way collision-free hash WMSN ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✖ ✖
mechanism fog based IoT healthcare function,
– XOR Operations
[89] Robust and secure authentication – Smartcard, Symmetric Multi- ✔ ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✖
scheme for IoT enabled devices in cloud encryption server
environments – One-way hash function, ECC WSN
[92] Lightweight privacy-preserving and – XOR Operations, One-way Hash WSN ✔ ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✔
session management for fog-related
systems
[93] Lightweight authentication for cloud- – Bilinear pairing, ECC, Fuzzy WMMSN ✔ ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✔
driven IoT intelligent data computing verifier, HMAC
[94] Anonymous mutual authentication for – Pseudorandom generator WMSN ✔ ✔ ✔ ✖ ✔ ✖ ✖ ✖ ✖
cloud-driven IoT based healthcare – One-way Hash, OTP
system
[95] Lightweight authentication scheme in – Secure Hash function WSN ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✖ ✔
the mobile sink for cloud-assisted – XOR Operations
systems
[96] The efficient mutual authentication – Enhanced Chebyshev WVSN ✔ ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✔
mechanism for enabling privacy – One-way Hash
preservation for UAV systems
[97] Secure authentication scheme for – Bilinear pairing WMSN ✔ ✔ ✔ ✖ ✔ ✖ ✖ ✖ ✖
multimedia medical information system – Secure Hash function
[98] Anonymous user authentication method – One-way collision-free hash WMSN ✔ ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✔
for securing healthcare applications function
– Symmetric key encryption
[99] Improved anonymous 2FA mechanism – Bitwise XOR Operations, One- WMSN ✔ ✔ ✔ ✖ ✔ ✔ ✖ ✖ ✖
for healthcare applications way hash, Symmetric-key
encryption

SP1: Secure Authentication; SP2: Key Management; SP3: Formal Security Analysis SP4: Lightweight; SP5: Efficient; SP6: 2FA; SP7: 3FA; SP8: MFA; SP9: Privacy
Protection;.
✔: Yes; ✖: No.

communication. However, the authentication procedure requires a few and secure authentication to authorize system requests. It may design an
standard requirements such as mutual authenticity, secure session key intelligent IoT application to gain system access that verifies the
management, and computationally efficiency. IoT devices have authenticity of the real-time objects using key agreement techniques.
restricted computation, processing, storage, and battery life due to their The common techniques of role-based access control and attribute-based
resource constraints. Therefore, preferably using a single authentication access control are two types of access control to ensure a valid autho­
scheme, it needs to utilize a multi-factor authentication mechanism. rization of any real-time object [131]. The former technique converts
Therefore, the schema should be useful because it works with multi- the system privileges into attributes for any real-time object. In contrast,
factor authentication, which needs extra load on IoT devices. In addi­ the latter converts the system privileges into functional roles for any
tion, the authentication schema requires combining encryption tech­ real-time object. In addition, a technique known as authentication and
niques, including RSA, SHA, AES, and ECC, to enhance security [130]. authorization for constrained environments ensures the authenticity of
Access Control assures the IoT devices that unauthorised users real-time objects.
cannot accesssensitive data. This is the backbone technology for gua­ Availability uses three basic functions such as physical, technical,
rantees information security to withstand various security vulnerabil­ and administrative to manage the operative features of the computer
ities. The main goal of access control is to monitor access to resources systems accessible by an authorized user. Most computing systems use
efficiently and protect against the unauthorised flow of information. In high order efficiency to operate better backup processing whenever is
IoT environments, the data can be transmitted continuously and shared needed. Two major threats such as loss of data and denial of services
data between people and things. IoT technology adopts access control disrupt the technological infrastructure actively to keep the crucial data

15
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Table 4
Taxonomy of IoT security Services.
Security Services Authentication Schemes
[49] [50] [51] [35] [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46]

Untraceability ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✔ ✔ ✔ ✔ ✔ ✔ ✔
User Anonymity ✖ ✖ ✖ ✔ ✔ ✖ ✔ ✔ ✖ ✖ ✔ ✖ ✖ ✖ ✖
Sensor Anonymity ✔ ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✖
Mutual Authentication ✖ ✔ ✔ ✖ ✖ ✔ ✖ ✖ ✔ ✔ ✖ ✖ ✔ ✖ ✔
Loss of synchronization ✔ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✖
Session Key
Construction ✖ ✔ ✔ ✖ ✔ ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✖ ✖ ✖
Session Key Agreement ✖ ✖ ✖ ✖ ✔ ✔ ✔ ✖ ✖ ✔ ✖ ✔ ✔ ✔ ✖
Perfect forward secrecy ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✔ ✖ ✖ ✔ ✔ ✖ ✖ ✔
Security Services Authentication Schemes
[98] [99] [100] [113] [114] [115] [116] [117] [118] [119] [120] [121] [122] [123] [124]
Untraceability ✖ ✖ ✔ ✖ ✖ ✔ ✖ ✔ ✔ ✔ ✖ ✔ ✖ ✖ ✔
User Anonymity ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✖ ✔ ✖ ✔ ✖ ✖ ✔
Sensor Anonymity ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✖
Mutual Authentication ✔ ✔ ✖ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✖
Loss of synchronization ✖ ✔ ✖ ✔ ✖ ✖ ✔ ✖ ✔ ✔ ✖ ✔ ✖ ✖ ✖
Session Key
Construction ✔ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✔ ✖ ✔ ✔ ✖ ✖ ✖
Session Key Agreement ✖ ✖ ✔ ✖ ✖ ✔ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✔ ✖
Perfect forward secrecy ✖ ✖ ✔ ✔ ✖ ✔ ✔ ✔ ✖ ✔ ✖ ✔ ✔ ✖ ✔

Provided: ✔ Not Provided: ✖.

unavailable and lengthen the data outage times as much as is feasible. As dynamic deployments at large-scale industries. Data security necessi­
a result, the organization proactively set its protective strategy to tates the use of encryption to secure the data while transmitting over an
maintain the system backups and to repair the data breaches to meet the insecure communication channel. Furthermore, it ensures to provide of
requirements of data protection and privacy. access control policies for governing data control over location and time.
Data freshness ensures that the sensory devices send the freshness of Therefore, the data collected from various sources must be authorized
the data. The freshness property ensures that every received message and governed by enabling access control at various levels of data secu­
should be fresh. It necessitates using recent data sets and ensures that no rity [134].
attacker will respond with an old message. Battery life: Most IoT devices have been deployed in environments
Non-repudiation ensures that communicating parties’ data trans­ where battery power is unavailable, limited power to execute the
mission cannot be denied by earlier sending the message. It can be planned security feature, and heavyweight security functionalities
considered when the communicating parties have bound to the contract. consume battery resources. As a result, three alternative solutions to this
Resilient to device security: in the IoT environment, all the devices problem were proposed by various scholars. To begin, employ the de­
are interconnected; if one device is compromised, an attacker can vice’s most basic security features. However, dealing with sensitive in­
physically capture it. Resultantly, each attacker can get their hands on formation such as healthcare, the military, and the government is not
the device’s secret credentials stored in its memory.[132]. Besides, an advised [135]. The second suggestion is to increase charging/battery
attacker gathers secret session keys that are being issued between the capacity; Practically, all IoT devices have been intended to be small in
user and IoT devices. Thus, the compromised node should not influence size.
the security of other parts of the network. Therefore, some security Node-Level Security: To achieve IoT node-level security, IoT security
mechanisms must be implemented to secure other non-compromised solutions must integrate the functional blocks as interconnected mod­
devices. There must be a need to design secure authentication and key ules. Data protection, device security, and device integrity and identi­
agreement mechanisms to withstand device security. fication compliance requirements are among them. The first step in
Lightweight encryption [40,43,44,74] mentions that the conven­ operationalizing trust at the device/node level is to automate and link to
tional cryptographic solutions could not fit the IoT environments standards-based, proven technologies/products to provide end-to-end
because of their limited resources. Most of these IoT devices are data security and privacy based on policies [136].
equipped with less computing and storage, and battery power. Thus, Secure Routing is one of the most difficult tasks to establish a safe
lightweight cryptographic solutions were recommended to ensure the routing mechanism for data transfer in the Internet of Things. A protocol
security of the IoT environments. As a sequence, the researchers suggest like this should create a secure path between communication nodes by
reusing existing functions to reduce the complexity of the security al­ establishing a safe route. Low-power IoT networks must adequately
gorithm to use resource-constrained devices within the limited serve them; computations performed for routing data should be light­
resources. weight. It is necessary to secure the security and privacy of the IoT de­
Secure Key Agreement: Due to the public network environments, vices in the IoT network. As a result, a safe routing protocol must be
adversaries can implement malfunctions, including eavesdropping, capable of maintaining location privacy [137].
replaying, or modifying messages, and impersonating legitimate users to Privacy Protection is one of the most important ideas in security
access remote services. Mutual authentication between entities must be research resulting in property loss and serious threats to human safety.
required to ensure secure transmission [133]. Therefore, a shared key Furthermore, IoT devices save a large quantity of private data, such as
must be generated and distributed among the connected entities to passwords, the time of automated on/off lighting, blood pressure and
ensure secure communication. Otherwise, the entities cannot be mutu­ heart rate, and so on. Due to storage limitations, the acquired data
ally authenticated and restrict unauthorised network access. cannot be saved in IoT devices indefinitely. Furthermore, the obtained
Data Security is one of the primary challenges affecting data privacy data can be moved to the cloud for long-term storage and processing;
in the development of IoT environments. In the IoT environment, the however, having one’s private information stolen by third-party appli­
deployment of these data security solutions cannot be straightforward cations or adversaries could result in severe consequences, including a
because of their resource constraint features, heterogeneity, and threat to one’s life [138].

16
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Secure Communication is to ensure that data is transferred securely Trust: The diverse capacities of these devices operate as a motivator
across a public network without revealing information to third parties, for resource sharing between them. However, maintaining trust in the
preventing unlawful data collection about things and people [139]. myriad of pervasive and diversified IoT devices is critical for effective
Profiling and trackinge often rely on policing and traffic manage­ resource sharing [144].
ment to extract the profiling features of network information systems Trajectory is a specific type of data that is frequently collected by
and to analyze the application-level traffic based on automation tech­ various sensors deployed in IoT environments. Today, multiple variants
niques. Associating an identity with a specific person is a risk because it of trajectory data have been made available for tracing and human ac­
may lead to profiling and tracking. As a result, one of the most signifi­ tivity profiling. The trajectory can be generated in massive amounts of
cant issues is to prohibit such conduct in the IoT and implement some data collected from many sensors and other IoT devices. Besides, the
preventative measures [139]. trajectory is aimed to perform mobility tracing [145] which is widely
applied in numerous applications, including urban planning [146],
5.3. Security issues and challenges market analysis [147], and route choosing [148]. Trajectory services
make people obtain real-time trajectories and examine travel trends.
Of late, various security issues have been identified in surveys [24, Thus, trajectory becomes a key promising tool for adversaries to obtain
27–34,48,9]. As IoT deployments can occur in hostile environments, user activity and perform malicious actions. Chen et al. [149] presented
there is a huge chance to attack the devices physically. Besides, a variable-length n-gram framework to achieve differential privacy to
numerous threat scenarios are coming up every day to attack individual produce sequential data by using various parameters including choosing
devices or an entire network. Based on recent studies, As the application threshold values, allocating a privacy budget, and imposing consistency
plane increase, the attack plane also increases. limitations to ensure system efficacy.
Mobility: IoT device mobility has become an essential part of Dynamic Security Update: It is strongly advised that security
humans’ daily lives in the advanced computing paradigm. The wearable schemes be kept up to date to combat security flaws in existing systems.
device is an example of a mobile device that monitors biomedical in­ When the device revocation or addition performs in the connected
formation like temperature, SpO2 levels, heart rate, pulse rate, etc. It network, the trusted authority should inform the other device to update
then transfers it to the cloud to be processed and stored in online patient the same information in the other device’s memory. Thus, implementing
care systems. These wearable devices will be linked to the specified a mechanism that supports dynamic security updates can challenge IoT
network; the connectivity can be varied based on their presence, it will environments [150].
connect to a home network or personal network, or any private network Security against physical capturing: In hostile IoT environments,
[140]. Therefore, different networks may require different user security there are many chances that attackers can physically steal the devices.
services, configurations, and settings. Thus, designing By then, the attacker may use power analysis tools to retrieve the secret
mobility-supporting security schemes is a challenging task in the current information stored in the devices to perform malicious tasks that may
IoT environment. down the entire system’s performance or damage the system. Besides, an
Energy: In the resource-constrained IoT environment, the sensors attacker also replaces a malicious device by cloning the original device.
and other communication units have less battery power [141]. It is Therefore, a tamper-proof security mechanism can be the solution for
designed to save power when there is no use automatically. However, it defeating such attacks. Thus, it is highly demanded to design authenti­
becomes extremely difficult to design a security algorithm to execute cation schemes to withstand device-stolen attacks [151]. Resultantly,
low-power conditions because of battery power and backup limits. when the device is stolen, it should not affect the security of the
However, various security solutions [68,70–73,131–136] have been remaining part of the communication in the system.
developed using one-way cryptographic hash functions to overcome Limited computation power and storage: In the current techno­
computing and communication costs. But it is still challenging to pro­ logical era, designing a standard IoT device can always be challenging,
vide high-level security to these devices. and the performance of these IoT devices can be limited. In such a sense,
Location: There is a wide range of Web services and applications that the computation power, storage, and battery are limited. Thus, it cannot
offer location-based services. To have access to services, users must first perform high computation tasks. Such that it is not advisable to perform
register their location with the service provider. In many circumstances, high-level cryptographic solutions on these resource-constrained de­
location data leaking is a clear hazard and a legitimate issue for users. vices [152]. Traditional cryptographic solutions may require large
Wei et al. [142] proposed mobile internet social networks that enable storage space to store these secret keys and devices’ information and
anonymous location sharing while keeping flexibility. Within a given require high computing power to execute security protocols. Therefore,
spectrum of social relationships, the system may detect untrustworthy it is highly demanded to design a security mechanism or a protocol to
strangers. It conceals location data by splitting users, creating unique meet the requirements of resource-constrained devices without
identifying IDs from anonymous location data, and storing them in two compromising security.
distinct entities. The information about the location will be innocuous if
one of the storage entities is leaked or attacked because it will not reveal 5.4. Potential attacks
user identities. Liang et al. [143] proposed a method for preserving
mobile users’ location data. The model uses Breaking location infor­ With the rapid advancements of IoT, it is evident that millions of
mation into groups and storing them independently using a Markov devices are connected online to provide various solutions. Besides, it
chain for distributed cache-pushing proxies. Cache proxies receive increases the use of the application domain. In turn, it reflects the
location-based data without revealing their true locations to service network bandwidth, storage, memory, and other related technical
providers; the location information is preserved. complexities. Furthermore, it isn’t easy to efficiently handle all the ap­
Tracking and localization: Another issue is localization when com­ plications and devices due to IoT environments’ autonomous and het­
puters attempt to track and record a person’s whereabouts through time erogeneous nature. As a result, it increases the attack plane and opens
and space. One of the most difficult aspects of developing security so­ doors to various potential attacks. This section reviews several potential
lutions for IoT is designing protocols for interactions with IoT that attacks that are common to IoT environments. Fig. 12 depicts the attack
discourage such behavior. In e-commerce applications, profiling infor­ classification based on security features [153–155,93,156–165].
mation about a specific individual can deduce interests by looking at Node Capture has an attacker who monitors the node and thus gains
other people’s profiles, and data is very frequent. Balancing company control over cryptographic keys and protocols and also performs node
interests in profiling and data analysis while respecting user privacy is a cloning. In this attack, the node refused to sleep after sending sensed
significant challenge. [144]. data.

17
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Fig. 12. Attack classification in IoT Environments.

DoS leads to the shutting down of systems and prevents authorized Jamming disturbs the communication between the reader and the
users from their accessing including services and resources. Moreover, tag. Thus, interrupts RFID communication
the legitmate user cannot access the information systems due to band­ Tag Removal which has tags not implanted inside the things, tags
width overload or host network with trafiic. can be easily damaged or removed.
DDoS has a common type of denial of service leveraging the targets Side-Channel could perform on encryption devices. So that the se­
with network traffic or malicious software which eventually makes the cret key can be discovered.
system inaccessible for a cretain period of time. Eavesdropping/sniffing listens on private communication across
Malicious Node Injection defines the malicious node injection from the communication channel using a passive assault.
intruders. Routing can listen on private communication across the communi­
A firmware backdoor describes the malicious functioning of back­ cation channel using a passive assault, further affecting message passing.
ground firmware access. Exploit may be in the form of software or chunks of data or a
Fake Node/Sybil utilizes fake identities and Cross-Site nodes to sequence of commands that aim to control the system and deceive the
generate incorrect data. information stored on the network.
Replay constitutes information retransmission without granted Tracing gathers enough private information to link data to a specific
authorization. real identity in this technique.
Man-in-the-Middle listens to the traffic, obstructs it, and impostures Buffer overflow reserve space for an incoming packet; an intruder
two sides of the data. may violate this mechanism by sending incomplete packets.
Routing Threats creates a loop in the route that causes a shortage or Spoofing comprises the fake tag, which is considered a valid tag so
extension of the routing path. that the attacker can rewrite new RFID tags.
Side-Channel could perform on encryption devices. So that the se­ Cloning seizes a valid tag’s data and creates a fake copy of the new
cret key can be discovered. tag’s above data.
Storage that has user’s information attempted to be made wrong by Cross-Site Scripting induces an injection attack on a client-side
an attacker to access the cloud and other storage devices. script and changes the application’s contents according to its usage.
Offline Password guessing uses millions of passwords and subse­ Malicious Code includes code in any part of the software, which
quently matches with the captured unit succeeded. It can be done by causes undesirable influence and affects the total system.
utilizing either brute force or dictionary attacks. Tag modification can easily modify or delete information of tag data.
Mass Node Authentication requires an enormous amount of network Brute force generates many sequential guessed passwords until it
communication. Thus, the performance of the whole system is affected. gets the correct one.
Timing captures the system’s security which may include crypto­ The stolen verifier has the server’s verification details for the current
graphic algorithms based on the timing. It exploits the timing variations or previous successful authentication session stolen by an adversary.
caused by several inputs. Following that, it creates and sends authentication messages to the
Denial of Sleep influences the power supply of the node. server using stolen data.

18
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Known Key gets the previous session keys to obtain any other keys in schemes have addressed using WSNs for a distinct purpose. For instance,
this attack. WSN for health care through body sensor networks, WSN for industrial
Insider performs malicious activities on the network. It affects the and military, WSN for multimedia, and agriculture monitoring [168,
network availability overloading massive processing capacity; thus, it 112] proposed one secure authentication schema favoring an anony­
causes the entire network or system to crash. mous patient monitoring system leveraging WMSNs. Ali et al. [59]
Chosen ciphertext can obtain plaintext for chosen ciphertext. designed a reliable security mechanism for agriculture monitoring using
WSNs, which determines system setup, professional registration, login,
6. Countermeasures and performance analysis session-key management, password update, and authentication adaptive
node addition phases. In Ref [168], their scheme introduces an
This section provides a comprehensive study of various cryptosys­ identity-based authentication mechanism and a key agreement scheme
tems and performance analysis for different authentication mechanisms. leveraging WSN for agriculture monitoring. Both [112] and [177]
Computing and storage resources on IoT devices are limited; nonethe­ schemes are popular and widely spread across various security research.
less, computation, connectivity, and storage requirements for IoT ap­ Moreover, authors in [149] found out that the [59] scheme can fail to
plications are crucial. Computing and storage resources on IoT devices provide user un-traceability, sensor-node, insider, session-key, perfect
are limited; nonetheless, computation, connectivity, and storage re­ forward secrecy attacks, and failed from protecting against denial of
quirements for IoT applications are crucial. We discussed various cryp­ service during the password update phase.
tographic standards for authentication schemes to provide better Today, multimedia content can be primarily used for several appli­
security. We summarized the communication cost, computation cost, cations to ensure personal and public services. These contents can
and security requirements of several authentication schemes selected for transmit via various networks. Hence, a reliable and secure authenti­
the review. Around twenty security requirements, according to cation scheme is highly demanded. Recently, Kumari et al. [176] pro­
numerous research investigations, can ensure authentication procedures posed an authentication scheme for multimedia communications in
in various WSNs. We denote these security requirements using P1 to IoT-enabled WSNs, applied in the coal mine for safety monitoring.
P18, respectively. Table 5 presents the comparison of several potential Their scheme claims that the designed system actively resists various
security attacks and functional requirements. We also compare the attacks, including a user node, the sensor node impersonation, and
performance of several WSN-based authentication systems in this sec­ sensor node anonymity. Mishra et al. [179] proved that Kumari et al.
tion. We evaluate several security requirements in Tables 8, 9 and 10 scheme has some design issues. The system is subject to a variety of
depict the comparison of performance evaluation computation, assaults, including impersonation attempts on users and sensor nodes.
communication, and storage cost to determine which scheme can be Authors in [176] devised a mechanism for user authentication using a
suitable to protect real-time applications. The detailed communication smartcard with the BAN logic model to overcome the mentioned issues.
cost, computation cost, and energy cost of related authentication In [179], three-factor authentication and key agreement scheme have
schemes have summarized in Table 7. Gope et al. [166] ’s communi­ been proposed and ensured that their mechanism could resist various
cation cost is the lowest. Subsequently, Srinivas et al. [167] mutual well-known security attacks. But Yang et al. [169] described that [179]
authentication for WMSNs can be the highest. scheme is susceptible to user impersonation, privileged insider, and
server spoofing attacks.
6.1. Countermeasures The future generation of cellular networks (5 G) drastically increases
the performance of message transmission. Several advanced authenti­
Several key agreement and authentication systems have recently cation schemes have been proposed based on complex bilinear-pairing
been implemented to protect communication and the environment from operations; For vehicle networks, identity authentication and condi­
various security risks. Today, the rapid growth in IoT environments has tional privacy are insufficient to analyze the messages. Cui et al. [180]
brought remarkable services and advancements to 21st-century human proposed a lightweight message authentication scheme and framework
lives. However, with the device heterogeneity and resource constraint model for 5G-enabled vehicular networks to address this issue. Zhao
nature, the IoT faces numerous security issues at various levels of et al. [181] proposed a required medium access control scheme based on
deployment, communication, and processing stages. Therefore, re­ multichannel cooperation in vehicular Ad hoc networks. Authors in
searchers found various security measures to withstand potential attacks [182] proposed a secure and robust authentication mechanism for
and secure communication between devices and systems. Table 6 de­ mobile-sink in IoD applications. Their scheme enables the UAV-WSN
picts various countermeasures that have been considered for enabling extended authentication to overcome UAV communication. Lately,
security for various IoT environments. These security mechanisms use a Chen et al. [183] devised a secure authentication scheme for IoV envi­
smartcard, biometric, ECC, symmetric encryption, fuzzy extraction, ronments. Their scheme is enhanced to withstand offline identity at­
secure hash, and bitwise XOR operations. Finally, Table 11 shows the tacks, location spoofing, replay, and tracking attacks.
acronyms used in this paper. Liu et al. [184] devised the first secure password-based authentica­
Das et al. [177] devised a robust user-anonymous authentication tion mechanism for WBAN to achieve strong user anonymity. In WBAN,
mechanism for WMSNs, ensuring their proposed scheme could secure patient care information is completely personal and confidential. Pri­
various attacks and be more effective because of computation and vacy is the key concern for WBAN. Therefore, Xie et al. [185] presented
communication costs. Hence, this scheme can be advisable for various a robust and novel certificateless authentication scheme for WBAN for
real-time medical applications. Wu et al. [178] devised a robust and enabling conditional privacy-preserving to assure the patient’s data.
secure authentication scheme for enabling a privacy-preserving mech­ Their scheme enhances security and computational efficiencies by
anism for WSNs to help real-time applications further. Their scheme comparing other existing schemes. Shuai et al. [174] devised a robust
proved that [177] scheme is still susceptible to sensor-node capture, and secure privacy-preserving authentication mechanism for WBAN. It
user-impersonation, and offline password-guessing attacks. Ever et al. uses ECC to assure lightweight functionality. Their scheme adopts cer­
[74] reported that the existing authentication mechanisms of Turka­ tificateless authentication based on identity-based cryptography to
novic et al. and Farash et al. thoroughly crypt-analyzed to prove various make multi-server architecture without third-party interaction.
vulnerabilities, including reply, password guessing, smartcard lost The majority of current body area networks are vulnerable to a va­
verifier, and MITM attacks. To overcome some of the existing security riety of data security and privacy issues. A scarcity of anonymity and
flaws, Ever et al. [74] proposed a novel and lightweight S-AUAS scheme secure authentication leads to complete system failure in WBAN.
that influences several merits and protects from faulty risks. Recently, Jegadeesan et al. [186] created a secure and strong anony­
Few recently reviewed that authentication and key agreement mous authentication technique to provide healthcare users with data

19
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Table 5
Summary of various authentication schemes preventing potential security attacks.
Reference Authentication Scheme Potential Attacks
P P P P P P P P P P P P P P P P P P
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

[40] A robust and secure authentication scheme ✖ ✖ ✔ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✔ ✖


for human-centered industrial Internet of
Things
[125] Enhanced lightweight mutual ✖ ✔ ✖ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✖
authentication scheme for cloud-IoT
[119] Lightweight authentication and key ✖ ✔ ✔ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✔ ✔ ✖ ✖ ✖ ✔ ✔ ✔
agreement scheme in the mobile sink for
cloud-assisted systems
[120] The efficient mutual authentication ✔ ✔ ✔ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✔ ✔ ✖ ✖ ✖ ✔ ✔ ✔
mechanism for enabling privacy
preservation for UAV systems
[121] A novel secure authentication scheme for ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✔ ✔
MMIS
[157] Secure and robust anonymous user ✖ ✔ ✖ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✔ ✔ ✖ ✔ ✔ ✖ ✔ ✖
authentication and key agreement scheme
for TMIS
[158] Robust authentication and key agreement ✖ ✔ ✔ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✔ ✔ ✖ ✖ ✖ ✖ ✔ ✖
scheme considering user anonymity for WSN
[159] Efficient mutual authentication and user ✖ ✖ ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✔ ✖ ✔ ✔ ✔ ✔ ✖
anonymity for IoT-based medical care
system
[160] Secure 3FA mechanism for securing ✖ ✔ ✖ ✖ ✔ ✖ ✔ ✖ ✖ ✔ ✔ ✖ ✖ ✔ ✖ ✖ ✖ ✖
heterogeneous WSN
[161] BAKMP-IoMT: Blockchain-based secure ✖ ✖ ✖ ✖ ✔ ✖ ✔ ✔ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✔ ✖
authentication and key management
protocol for IoMT environments
[162] An enhanced three-party pairwise secret key ✖ ✔ ✖ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✔ ✖
agreement system for fog-driven vehicle ad-
hoc networks
[163] Secure aware authentication and key ✖ ✔ ✖ ✖ ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✖
management protocol for V2G in the social
internet of things for enabling dynamic
privacy-preservation
Reference Authentication Scheme Potential Attacks
P P P P P P P P P P P P P P P P P P
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
[64] Secure, lightweight authentication and key ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✔
management for IoT environments
[65] Secure authentication and key agreement ✖ ✔ ✖ ✔ ✔ ✔ ✔ ✖ ✖ ✖ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✖
mechanism using smartcard
[66] Lightweight 2FA for personalized healthcare ✔ ✔ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✔ ✖ ✔ ✖ ✔ ✖ ✔
systems
[67] Secure and robust ECC-based authentication ✖ ✖ ✖ ✖ ✔ ✔ ✔ ✖ ✖ ✖ ✔ ✔ ✖ ✖ ✖ ✖ ✔ ✖
scheme for preserving privacy in IIoT
environments
[68] Lightweight MF secure smartcard-based ✖ ✔ ✔ ✔ ✖ ✖ ✔ ✖ ✖ ✖ ✔ ✔ ✖ ✔ ✖ ✔ ✖ ✖
remote authentication for Cloud-IoT
applications
[69] Efficient authenticated key agreement ✔ ✔ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✔ ✖ ✔ ✖ ✔ ✖ ✔
scheme for multi-gateway WSN
[70] Mutual authentication scheme for WMSN ✔ ✔ ✖ ✖ ✔ ✔ ✔ ✖ ✖ ✖ ✔ ✔ ✖ ✔ ✖ ✖ ✖ ✖
[71] Biometric-based authentication scheme for ✖ ✖ ✖ ✖ ✔ ✔ ✖ ✖ ✖ ✖ ✖ ✔ ✖ ✔ ✖ ✔ ✖ ✖
WSN
[73] Authenticated key management scheme for ✔ ✔ ✖ ✖ ✔ ✖ ✔ ✔ ✖ ✖ ✔ ✔ ✖ ✖ ✔ ✖ ✔ ✖
cloud-enabled BAN
[74] Three party Lightweight authentication ✖ ✖ ✖ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✖
schemes for secure data transmission in IoT
networks
[131] Pairing-based anonymous, secure ✖ ✖ ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✔ ✖
authentication scheme for IoT
[132] Provably secure MFA for IoMT environments ✖ ✔ ✖ ✖ ✔ ✖ ✖ ✔ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✔ ✖
[133] Secure authentication mechanism with ✖ ✔ ✖ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✖
forward secrecy for IoT
[134] Robust and secure authentication and key ✖ ✖ ✔ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖
management mechanism for securing data
transmission in IoT environments
[135] ECC-based authentication scheme for IoMT ✖ ✔ ✖ ✖ ✔ ✖ ✔ ✔ ✖ ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✔ ✖
[136] Cloud-based data de-duplication with ✖ ✔ ✖ ✖ ✔ ✖ ✔ ✖ ✔ ✖ ✖ ✔ ✖ ✔ ✖ ✖ ✖ ✖
authenticated key management scheme for
IIoT
[137] An anonymous remote user authentication ✖ ✔ ✖ ✖ ✔ ✖ ✔ ✔ ✖ ✖ ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✖
mechanism for smart home environments
(continued on next page)

20
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Table 5 (continued )
Reference Authentication Scheme Potential Attacks
P P P P P P P P P P P P P P P P P P
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

[138] Mutual authentication for establishing a ✖ ✔ ✖ ✖ ✔ ✖ ✔ ✔ ✖ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖


secure D2D communication session in the
edge-based smart cities
[140] The secure authentication mechanism for ✔ ✖ ✔ ✖ ✔ ✖ ✔ ✔ ✖ ✖ ✖ ✔ ✖ ✖ ✖ ✖ ✖ ✖
smart homes

P{1}: Node Capture; P{2}: Privileged Insider attack; P{3}: DoS/DDoS; P{4}: Server Spoofing; P{5}: Impersonation attack; P{6}: Desynchronization Attack; P{7}:
Replay Attack; P{8}: MITM Attack; P{9}: Brute force attack; P{10}: Side-Channel Attack; P{11}: Smartcard stolen Attack; P{12}: Offline Password guessing attack; P
{13}: Eavesdropping; P{14}: SSTPI attack; P{15}: Server spoofing attack; P{16}: Forgery Attack: P{17}: Stolen verifier Attack; P{18}: Session key disclosure attack; ✔:
Yes; ✖: No.

In their scheme, the registration center initially generates the secret


Table 6
information for each communicating node. Then the role of the regis­
Summary of Countermeasures used in the Authentication schemes for IoT
tration center is not required for computation and communication.
environments.
Resultantly, their scheme achieves reduced exponential complexities
Countermeasures References and computational overheads. It could not, however, withstand forgery,
Pseudonym-Identity [168,82,85,94,114,117] password guessing, or monitoring assaults.
Password [36,40,61,58,76] Chang et al. [189] presented a novel authentication mechanism for
Smartcard [29,36,38,43,50,73,76,89,161]
heterogeneous ad hoc networks. Unfortunately, their scheme fails to
Biometric [39,45,75,92,93,125]
[114,75,169,170,171] withstand node capture, spoofing, smart card stolen, and stolen verifier
Pseudo Number Generator [94,172] attacks. Consequently, Li et al. [178] demonstrated the limitations of
Bilinear pairing Cryptosystem [97,93] Chang et al., such that their schemes cannot withstand proper mutual
Rabin’s public key [45,117] authentication and other network security issues. Li et al. presented a
PUF [81]
ECC [75,173,125,84,87,89,93,119,174,
three-factor authentication protocol for WSN in IIoT to restrict the above
175] scheme’s weaknesses. Their scheme ensures that it carries energy effi­
ECDH [81,176] ciency along with the required security properties. Later, Mo et al. [125]
Symmetric Encryption [59,38,40,76,89,98,99] presented a biometric-based privacy-preserving authentication mecha­
Asymmetric Encryption [49]
nism for cloud-enabled IIoT deployments. Their schemes ensure strong
Fuzzy Extraction & Fuzzy Commitment [75,75,125,145,128]
[170] authentication between the users and connecting devices using pre­
Chebyshev Chaotic map [80,96,113] established key agreements with gateway nodes. Finally, the authors in
One-way hash function [22,70,109–129] [175] proposed a secure authentication scheme with privacy preserva­
Bitwise XOR Operations [49–51,37,38,112] tion in IIoT environments. Their scheme ensures lightweight computa­
[42–44,47,81–89]
[116,119,123,128,129]
tion using ECC computations. Their scheme overcame various
Biohashing [44,82,124] challenges addressed for the IIoT environments and proved secure
against known attacks and computationally efficient.
Lately, Li et al. [170] devised a 3FA anonymous authentication
protection and privacy. Their scheme achieved efficiency by reducing mechanism for WSN. Their scheme uses biometrics as the third factor to
computational overheads during the login and authentication phases. enhance the security of the proposed mechanism. A fuzzy extractor
The use of WBAN is exponentially increasing in daily life. Resultantly, scheme was adopted to handle the biometric information. With the rapid
voluminous medical data is being generated from a variety of healthcare development of IIoT, large voluminous data is being generated from
applications. Thus, it is highly essential to secure communication be­ various large-scale industrial sensors. Storing and processing these vol­
tween the WBAN client and the applications. In a larger variant, the uminous data in IIoT devices locally becomes challenging because of
collected information may be related to medical institutions, medical their resource constraints. Thus, local processing and permanent storage
experts, and hospitals, which is huge. Conventional methods could not are necessitated to handle these voluminous data. Cloud and fog
process them effectively and securely. For instance, most of the existing computing models have emerged to handle such kinds. However, there
anonymous authentication mechanisms fail to withstand malicious cli­ are various integration issues have been raised to handle data security
ents sending false messages to trap the application provider which and privacy. Fu et al. [170] presented a novel framework to integrate
causes severe medical damage. To overcome this issue, Ji et al. [187] cloud fog layers into IIoT environments. Their framework resolves la­
presented a big data service-oriented certificateless conditional tency issues and remote authentication [190]. Their scheme enhances
privacy-preserving authentication mechanism for WBAN. the performance by connecting fog nodes, and ensured that it gives
Later, For the Industrial Internet of Things (IIoT), Li et al. [173] better search results than other linear searches.
suggested an ECC-based proven safe user authentication approach with
privacy protection, ensuring that it would resist various security as­
saults. Li et al. [173] set out to demonstrate that different existing 6.2. Performance analysis
symmetric-key cryptography and hash-based user authentication tech­
niques could not withstand safe anonymity and smartcard theft/loss The standard way of computing the protocol’s execution time cal­
attacks. Their scheme provides a comprehensive ECC-based safe culates its computational cost of various operations. By performing a
authentication and biometric-based authentication strategy for IIoT simulation, we can measure the execution time. This section found the
privacy preservation to address the flaws. Subsequently, Singh et al. execution time of various operations such as XOR, ECC, and Hash. And
[188] presented an effective, lightweight authentication mechanism for we compare several schemes using simulated with MIRACL, BAN-Logic,
human-centric IIoT environments. Their scheme ensures primary secu­ and Random Oracle Models. Based on this specification, the computa­
rity properties like mutual authentication, secret session key exchange, tion cost of various authentication schemes is depicted in Table 7.
and independent communication complexities for each involved node. Generally, computation cost can be calculated on the sensor side and the
gateway side on the user side. For example, ref [1] described that it costs

21
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Table 7
Comparing the efficiencies of computation, communication, and storage.
Authentication Scheme User/Node/ Gateway (Login/ Server Total Communication Execution Energy
Sensor authentication) (Login/ Computation Cost (bits) Time (ms) Cost
Registration authentication) Cost mJ

Lightweight 3FA for internet 8TH + TM 12TH + 1TQR 5TH 25TH + TM + TQR 1920 ∼ 0.3445 2.13
integrated WSN [45]
S-USI [80] 3TH + 2TM 8TH + TM + TQR – 11TH + 3TM + 960 ∼ 0.2065 0.91
TQR
Lightweight Privacy-preserving 5TH + TM + 2TQR 5TH + TM – 10TH +2 TM + 3296 ∼ 0.2091 0.93
2FA for IoT devices [81] 2TQR
Lightweight privacy-preserving 4TH + 2TM – 8TH + 2TM + 2TQR 12TH + 4TM + 3252 ∼ 0.2631 1.11
and session scheme 2TQR
interrogation [92]
Lightweight authentication for 10TH + 2TM + 14TH + TM + 3TQR 3TH 27TH + 3TM + 1504 ∼ 0.4872 3.31
cloud/IoT [93] TQR 4TQR
Smart lightweight privacy 4TH 5TH + 3TM + TQR 10TH + 9TM + TQR 19TH + 12TM + 1352 ∼ 0.4671 3.11
preservation mechanism for 2TQR
IoT based UAV systems [96]
Mutual authentication for 3TH + 2TM + – 5TH +2 TM + 3TQR 8TH + 4TM + 1440 ∼ 0.3038 1.91
multimedia medical 2TQR 5TQR
information system [97]
Improved anonymous 2FA 10TH + 2TM + 6TH + 5TM + TQR 4TH + TM + TQR 20TH + 7TM + 3968 ∼ 0.4337 2.87
scheme for healthcare TQR 3TQR
applications [99]
Lightweight user authentication 11TH + TM + TQR 7TH + TM + TQR 5TH + TM + TQR 23TH + 2TM + 2912 ∼ 0.3651 2.47
for cloud-based healthcare 2TQR
services [100]
Enhanced and robust – – – 14TH + 6TM + 3296 ∼ 0.2857 1.33
authentication scheme for TQR
multi-server environments
[113]
Lightweight device 9TH + TM + TQR 15TH + TM + TQR 8TH + TM + TQR 32TH + 3TM + 2400 ∼ 0.5177 4.23
authentication and key 3TQR
management scheme for edge-
based IoT [114]
3FA Authentication for WSN 8TH +2 TM + TQR 9TH + TM + TQR 4TH + TM + TQR 21TH + 4TM + 1856 ∼ 0.4007 2.97
[75] 3TQR

only two ECC multiplications and five hash functions, two repetitions at lightweight authentication offers better cost efficiency in terms of
the sensor side, and five Hash functions and the gateway side. And it communication, and energy to improve the transmission efficiency of
requires eight Hash functions respectively; the total computations cost the communication systems.
can be 29.4184 milliseconds needed to complete the experiment. In
order to signify a strong corroborative key agreement, various authen­ 6.3. Formal and informal security analysis
tication mechanisms [45,80,81,92,93,96,97,99,100,113,114,75] have
been analyzed rigorously. The study analysis shows that lightweight Nowadays, cryptographic protocols cannot give assurance to secure
authentication schemes have better efficiency in terms of computation, operations only using standard cryptographic schemes. Verification and
communication and energy to meet the standard requirements of validation of these protocols have been necessitated by using formal
emerging technologies such as automation, cloud computing, and data methods. Further, several specialized tools have been designed for
management. It is worth noting that these authentication techniques validating real-life cryptographic protocols. Besides, formal verification
rely on a hash-based symmetric cryptosystem to evaluate its security analysis is a standard protocol verification that is intended to provide a
features including privileged-insder and password guessing and to ac­ thorough means of evaluating the correctness and rectifying of the de­
cess the malicious activities of the unauthorised devices. fects of the security protocol. These tools offer feedback in terms of loops
The performance analysis considers a formal specification and to the designers of protocols to enhance security [191].
description of the py-crypto library to implement a few cryptographic These formal security analysis techniques include mathematical
functions including TH, TM, and TQR. The system configured with Ubuntu analysis based on logical analysis or process algebra. Various formal
19.04, 16GB RAM, and 3.60 GHz Core i7 processor to execute the security analysis tools are emerging, subsequently providing a standard
authentication techniques at an average of ∼ 10 times. In the analysis, verification functionality of the security mechanism, including a secu­
the functions namely TH, TM, and TQR are 0.0120 ms, 0.015 ms, and rity model, attack model, and performance evaluation. In recent times,
0.02957 ms respectively to relate computation with lightweight various formal verification mechanisms have been used by several re­
authentication schemes. In order to analyze the communication cost of searchers to enhance the performance of the security protocol. Some of
the lightweight authentication schemes, a few assumptions are as fol­ the famous formal security verification tools like Spi-calculus (Analysis
lows: 1. ∼ 160 bits are set to random nonce, timestamp, password and by Process), "BAN-Logic” [192], AVISPA [193], Game theory, and
user identity; 2. ∼ 256 bits are set to one-way hash function; and 3. ProVerif (Automatic Reasoning) [194] were depicted in Fig. 13 [195].
256 bits are set to public key. Also, this analysis considers an energy BAN-Logic: It consists of three steps: message source authentication,
consumption to examine the cost efficiency of the transmission rounds freshness, and source trustworthiness. [9,91–100,109–111,125–127]
carried by the lightweight authentication schemes [45,80,81,92,93,96, authors use BAN logic to show that the security mechanism can with­
97,99,100,113,114,75]. To compute the energy efficiency, EE = TC.PCPU stand various harmful attacks.
is utilized where TC is the total computation cost of a singly hash func­ ProVerif: It is an automatic security protocol analyzer, which pro­
tion ∼ 0.054 mJ and PCPU is maximum power capacity of the central vides a fully automated technique to verify the security protocols using a
processing unit ∼ 65W. The examination results demonstrate that the formal method known as the Dolev-Yao Model [109]. Besides,

22
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Table 8
Summary of various authentication schemes that shows performance and limitations.
Reference Authentication Scheme Technique Goal Security Performance (þ) Limitation (–)
Used Verification

[84] Secure 3FA for smart ECC Ensured security for consumer ROR – Demonstrated the usage – Susceptible to forgery,
healthcare services XOR USB -MSD, of USB-MSG suitable for tracking, impersonation
Operations Ensuring perfect secrecy and real-time implementation attacks,
One-way hash user anonymity – It could not establish a
USB secret session key and high
computational overheads
[85] Enhanced lightweight One time hash Ensure reciprocal authentication – – Included sub-phase – Focused only on
authentication for cloud- chain and key management phases for known as an indication of a registration and login phases,
based IoT environments XOR cloud-enabled IoT systems to failed connection, fails to restrict password
Operations improve security – It allows both the client guessing attacks.
Pseudonym and the server to
Identity participate.
[86] Efficient MFA for real- One-way hash Ensuring user anonymity and BAN Logic – Provides secure session – Computation and
time data access in WSN function perfect secrecy, key management between communication overheads
RSA Ensured to resist password the communicating entities are relatively high,
Cryptosystem guessing and tracing attacks – Fails to restrict forgery and
Fuzzy insider attacks
extractor
XOR
operations
[87] Lightweight ECC Ensuring secure communication ROR, – Establishes secure session – Still, it is susceptible to
authentication for IoD for One-way hash between users and drones by Scyther key management between password update and
smart city surveillance XOR assuring user anonymity and users and connected drones, tracking attacks
operations perfect secrecy – Resistant to potential
known attacks
[88] Authenticated key One-way hash Ensuring user anonymity, perfect BAN Logic, – Resilient to user tracking, – Communication cost is
agreement mechanism fog function secrecy, ProVerif password guessing, extremely high because of
based IoT healthcare XOR Ensured secret session key impersonation, and insider using pairing technique,
Operations management attacks, – It could not resist forgery
– Ensured high-level attacks
security at fog layer
[89] Lightweight Smartcard Enhanced the security by BAN Logic, – Resilient to forgery, user – Fails to provide user
authentication for IoT based restricting vulnerabilities in AVISPA tracking, privileged insider, anonymity,
enabled cloud Symmetric multi-server cloud environments and replay attacks. – Fails to restrict password
environments encryption – Ensured that it establishes guessing attack
One-way hash secure session key between
function multi-cloud servers
ECC

connections are the properties that describe events that can execute in known attacks, including MITM attacks, replay attacks, node capture
the protocol before other events. These events have been formulated attackers, desynchronization attacks and other related attacks.
using a logical formula that comprises conjunctions and disjunctions. In
[196,197], the authors used the ProVerif tool to prove their mechanisms 7. Research challenges and future directions
can simultaneously derive Mutual authentication and key exchange
between devices, and other networks should be implemented. Subse­ The cloud-enabled IoT environment offers numerous applications
quently, [93] and [174] authors use the ProVerif tool to demonstrate and services to enhance productivity from small to large-scale industrial
that the proposed method may pass verification using the Dolev-Yao systems. As it serves in open internet communication, several existing
model. schemes in the literature were discussed for challenges faced by IoT
Scyther: It is a push-button tool enabled with GUI for analysis, environments. Thus, we now point out current pressing research chal­
verification, and falsification of cryptographic schemes. Besides, Scyther lenges and future directions in this section. The overview of various
[195] has various characteristics: the chance of unbounded verification challenges and future directions is depicted in Fig. 14.
with guaranteed termination, analysis of an infinite number of traces in Monitoring and Sensing: Even while monitoring and sensing tech­
patterns, and multi-protocol analysis support. Also, the working prin­ nologies have advanced significantly, there are still numerous issues to
ciple of Scyther is based on a pattern refinement algorithm. Subse­ address with a special focus on form and energy efficiency. To collect
quently, the command line interface and some python scripting libraries real-time data, sensors and tags are normally assumed to be operational
enable easy user Scyther for large-scale security scheme verifications. at all times. This element makes energy efficiency, particularly in terms
AVISPA - It is a push-button tool consisting of various back-end tools of lifetime extension, critical. In large-scale industrial systems, minia­
having multiple automatic protocol analysis methods. It helps protocol turization has enabled the development of nanoscale actuators and
verification from falsification to abstraction depending upon verifica­ sensors [203].
tion methods for unlimited sessions. Besides, in [198], HLPSL is a M2M Communication: While there are already IoT communication
modular and expressive formal language that can specify protocols and protocols such as CoAP and MQTT, there is no open IoT standard.
properties. AVISPA now combines several back-end tools, including the Although all objects require connectivity, not all of them must be
Constraint Logic-based Attack Searcher (CL-AtSe) and the internet-connected since IoT devices require a specified capability of
On-the-Fly-Model-Checker (OFMC). SAT-based Model Checker and tree sending the data to a specified gateway. There are also a variety of
automata based on automatic approximations for the Analysis of Secu­ wireless technologies to choose LoRa, IEEE 802.15.4, and Bluetooth
rity Protocols (TA4SP) (SMC). In [159–166,199–202], the authors used standards even though it is unclear if current wireless technologies will
AVISPA to prove that their proposed mechanisms protect from several meet the wide range of IoT connectivity requirements [204].

23
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Table 9
Summary of various authentication schemes that shows performance and limitations.
Reference Authentication Scheme Technique Goal Security Performance (þ) Limitation
Used Verification (–)

[92] For fog-related systems, a XOR Operations Describe the technique of BAN Logic – The adoption of session – Computation and
lightweight privacy- One-way hash session scheme interrogation, probing is mathematically storage cost is relatively
preserving and session Enabling privacy-preservation driven by the session adaptive high,
management framework is to resolve major issues of LTE-A mechanism. – Susceptible to insider
available. networks – It minimizes the flooding and forgery attacks
attack detection,
– It ensures the real-time
design system provides call
setup time, session delay, RTP
utilization, and bandwidth
consumption.
[93] Lightweight authentication Bilinear pairing, To establish a seamless data BAN Logic – It adheres to compatible – Computation and
for cloud-driven IoT ECC, connection over a secure standards such as low cost and communication
intelligent data computing Fuzzy verifier network, low power consumption to overheads are relatively
HMAC It allows communication reduce computation and high because of cloud
parties to agree on mutual communication costs. server
authentication and a secret – Susceptible to forgery
session key. and tracing attacks
[94] Smart mutual Pseudorandom Providing smart mutual BAN Logic – It includes digital – Susceptible to insider,
authentication for cloud- generator authentication and revisiting authentication to cross- impersonation, and
driven IoT based healthcare One-way hash user anonymity, health-report examine the communication password guessing
system OTP revelation, forgery, entities’ shared secret key. attacks,
confidentiality, and non- – Computation overhead
repudiation is relatively high
[95] Lightweight authentication Secure Hash Lightweight continuous Scyther – It achieves better security – Consumes more
and key agreement scheme function authentication was preferred. efficiencies to withstand transmission delay and
in the mobile sink for cloud- XOR Operations It adopts a valid authentication forgery, password guessing, throughput rate because
assisted systems period to speed up the and replay attacks, of many authentication
authentication process – Introduced continuous phases
authentication scheme
[96] Smart, lightweight privacy Enhanced It is constructive to provide the ROR, – It does not use complex – It is still susceptible to
preservation mechanism for Chebyshev robustness between IoT Scyther cryptographic operations. tracing and
IoT based UAV systems One-way hash devices, – It proves less computation impersonation, and
It introduces secret token and and communication insider attacks
dynamic authentication for overheads to meet the
enhanced speedup requirements of surveillance
systems

Efficiency: Because of the different nature of IoT and the massive developing more advanced privacy models and privacy-oriented secu­
amount of data created, processing, analysis, and data management rity protocols and processes is practically applicable to designate
techniques are highly complex, especially in the current era of IoT research priority for the next years. Network virtualization adaption has
[205]. Currently, most systems use centralized systems to offload data emerged as a promising approach for ensuring privacy for a large vol­
and perform computationally heavy operations on a global cloud plat­ ume of data in IoT deployments and cloud management. SDN (soft­
form. Nonetheless, there is ongoing concern that traditional cloud ar­ ware-defined networking) has recently developed as a network
chitectures may not be capable of transporting the huge volumes of data virtualization concept [209].
created and consumed by IoT-enabled devices, as well as supporting the Robust and Resilient Architectures: Data integrations across several
associated computing load while meeting scheduling limitations [206]. settings are difficult in IoT and will be aided by modular, interoperable
Most systems rely on current technologies such as mobile cloud components. Infrastructure solutions will necessitate systems that can
computing and fog computing to address this issue, both based on edge aggregate large amounts of data from several sources, identify signifi­
processing. cant features, analyze data, and illustrate linkages, compare data to
Scalability: The IoT will be made up of billions of devices. While it is meaningful historical information, and aid decision-making. As a result,
doubtful that all devices would be connected in a mesh rather than in a single reference design cannot serve as a template for all applications.
hierarchical sub-domains, the number of networked objects will dwarf Users should not be forced to utilize fixed, end-to-end solutions because
the existing internet by several orders of magnitude. It is one of the most of architectures that are open and follow standards [210].
important concerns for enabling smart services in future IoT environ­ New and novel network designs are required for IoT networks. Once
ments [207]. It encompasses the addition of new sensors, cloud services, an attack has been launched, the IoT network must have strategies and
devices, and applications without disturbing the overall performance of protocols to ensure that the attack is detected as quickly as possible
the entire system. before causing substantial damage and spreading throughout the
Security and Privacy: IoT has become such an important part of the network. In the IoT network, quick recovery from faults is crucial. Long-
internet’s future due to its expanding use, and it needs to address se­ term disruptions in IoT services, particularly in disaster management
curity and trust functions properly. Many IoT devices have flaws, ac­ applications, could put people’s lives in jeopardy. Thus, resilient ar­
cording to researchers. In addition, because IoT is built on top of existing chitectures must be required in order to adopt advanced features.
WSN, It carries the same difficulties with privacy and security as WSN Privacy-aware authentication: The newest trends in IoT privacy
[208].Adaptable Networks: SDNs and Network Virtualization Context protection include user-centric and context-aware regulations. Other
management are planned to interface with the underlying IoT technol­ new solutions include context-centric and self-adaptive privacy-preser­
ogy and the privacy considerations that come with them in ving procedures and protocols that facilitate ambient intelligence. Data
next-generation networks, enhancing context quality. As a result, privacy protection in IoT streams is a new and rapidly expanding topic

24
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Table 10
Summary of various authentication schemes that shows performance and limitations.
Reference Authentication Scheme Technique Goal Security Performance (þ) Limitation (–)
Used Verification

[97] Mutual authentication for Bilinear Achieved mutual BAN Logic – Achieved enhanced security – Not withstand
multimedia medical pairing authentication, features of multimedia impersonation attack, user
information system Secure Hash Enhanced signal congestion and healthcare information anonymity, and insufficient
function bandwidth utilization system password update phase

[98] For healthcare One-way To ensure that the medical user BAN Logic – It efficiently restricts offline – It is still susceptible to
applications, an hash function and the healthcare provider password guessing and insider forgery, user tracking
anonymous authentication Symmetric have secure communication by attacks, attacks, and forward secrecy
mechanism is used. key providing user anonymity and – It establishes the secret
encryption mutual authentication session key between the
communicating medical
parties
[99] Improved two-factor Bitwise XOR To ensure mutual and ProVerif – It ensures efficient mutual – It could not restrict
authentication (two-factor) Operations, authentication and secure authentication between Forgery, tracking, replay
strategy for healthcare One-way communication between medical sensors and attacks and could not
applications hash function medical sensors and healthcare applications. properly establish secret
Symmetric applications – It strongly restricts offline session keys,
key To overcome various known guessing, impersonation, and – Communication cost is
encryption potential attacks from the node capture attacks at both relatively high
existing schemes sensor and application level

[100] User authentication that Bitwise XOR Ensures legitimate user access AVISPA – It ensures secure – It is still susceptible to
isn’t too heavy for cloud- Operations, specially designed for the communication between impersonation, forgery, and
based healthcare services One-way remote patient monitoring users (patients/medical tracking attacks
hash function service experts) by providing user
Masked anonymity and forward
password secrecy,
– It ensures secure
commencement for enhanced
security
[113] For multi-server settings, a Chebyshev To ensure extended security ROR – Ensures this scheme is free – It could not restrict forgery
more robust authentication chaotic map using chaotic maps in multi- ProVerif from synchronization attacks, and tracing attacks
technique has been Biohashing server environments, – It uses a timestamp to ensure
developed. One-way To avoid synchronization issues secured authentication,
hash function caused by adversary models, – It focused on adding
Prevents SSPTI additional features like
registration expiration, server
scalability, etc.
[114] For edge-based IoT, simple One-way Upon device authentication, it AVISPA – It ensures securing Edge – It could not resist stolen
device authentication and hash function ensures secure session driven IoT environments from verifier, user impersonation,
key management Pseudo communication between client known attacks vectors, – It could not support
mechanism have been identity nodes, edge nodes, and cloud – Shows better performance independent server
developed. Generator server password update, biometric
Bitwise XOR update phase, and smartcard
revocation phase

requiring dynamic data access control mechanisms and data manage­ standard interfaces in such disparate entities is critical, and much more
ment rules [211]. Most previous research has been on improving the so for applications that facilitate cross-organizational collaboration and
algorithmic steps in cryptographic algorithms that conduct crypto­ overcome a variety of system limits.
graphic operations. The protocols that carry out lightweight tasks to Physically Secure Authentication mechanisms: The secure
protect the IoT network are not considered in any present studies. authentication protocols developed for the IoT are not suitable for use
Because of the heterogeneous nature of devices, security provisioning on an IP network. IoT necessitates the WSN protocols must be modified
via IoT is far more difficult than WSN. and provisioned on the Internet in order to be used. Security solutions
Interoperability and design standards: A device is dependable must be modified because of the many Internet-connected gadgets,
when it consistently performs its needed function in its designated which are not feasible on today’s Internet [213]. Lightweight security
environment throughout time. In the Internet of Things, reliability is protocols are recommended for limited contexts, such as WSN, WMSN,
crucial. Many of the Things in the Agricultural IoT will be in rural re­ and WBAN. Various new security mechanisms that meet the unique
gions with limited access. Things in the Industrial IoT will almost needs of the IoT and existing security procedures on the Internet security
certainly be exposed to harsh environmental conditions while being solutions are not necessarily built for resource management is a major
used to control potentially harmful manufacturing operations. Medical barrier to their use in IoT.
IoT devices have the potential to be life-saving. As a result, a reliable Programming models: Different approaches to programming IoT
architecture is a necessary component of the IoT [212]. Reliability will applications are required due to the diverse nature of IoT. Programming
be supported by resilience and tolerance of faults in the network of other models for IoT applications and services focused on edge gadgets and
devices. Because the first requirement in Internet connectivity mandates worked within a single domain, such as manufacturing plants or ma­
that “connected” systems can “speak a similar language” in encodings chines, tend to use real-time and embedded computing standards. [198]
and protocols, interoperability has always been. It continues to be an investigates the use of cloud-based programming models with syn­
essential core idea about the internet. Various industries currently chronous and asynchronous APIs for smart buildings or smart cities
support their applications using several standards. Because of the huge [214] applications. The use of information flow programming models to
amounts and varieties of data and heterogeneous devices, adopting process streams of processes from IoT objects asynchronously is one

25
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Table 11 research groups exploring dynamic and functional variants in IoT pro­
Acronyms used. gramming models.
Acronym Definition Heterogeneity of IoT Environment: A heterogeneous distributed
IoT system is made up of many sub-systems. It consists of resource-
IoT Internet of Things
IIoT Industrial Internet of Things constrained nodes and more powerful nodes, such as embedded or
IoD Internet of Drones regular computer nodes. We’ll use a distributed IoT system with wireless
IoMT Internet of Medical Things nodes arranged into wireless sub-networks as an example [171]. As the
WSN Wireless Sensor Networks IoT is deployed in heterogeneous environments, node-level and physical
WLAN Wireless Local Area Networks
WMAN Wireless Metropolitan Area Networks
security remain a supreme challenge.
WMSN Wireless Medical Sensor Networks
WMMSN Wireless Multimedia Sensor Networks 8. Conclusion
WVSN Wireless Vehicular Sensor Networks
RFID Radio Frequency Identification
M2M Machine-to-Machine The purpose of this study was to deliver a rigorous systematic liter­
2FA Two-Factor Authentication ature review to analyze the critical aspects of smart IoT environments,
3FA Three-Factor Authentication such as security and privacy, with a specific focus on device connec­
MFA Multi-Factor Authentication
tivity. To address the challenges in device security and data privacy, this
H2M Human-to-machine
DoS Denial of Service study has extensively reviewed various key agreement techniques,
DDoS Distributed denial of service including two-factor, identity-based, multi-factor, etc. A safe and secure
SCADA Supervisory Control and Data Acquisition platform is much necessitated to adopt the technological advancement
AVISPA Automated Validation of Internet Security Protocols in heterogeneous environments that make the device to share the in­
CoAP Constrained Application Protocol
formation confidentially with a promise of service assurance. Thus, in
IBC Identity-Based Cryptography
DHKE Diffie-Hellman Key Exchange this study, six major parts have been categorized to discuss various
PUF Physically Unclonable Functions challenges in IoT environments. The first part detailedly referred to the
PKI Public Key Infrastructure layered architecture of IoT to visualize the production flows of
AES Advanced Encryption Standard
numerous application domains, namely healthcare, smart cities, etc. In
RSA Rivest–Shamir–Adleman
PIN Personal Identification Number
the second, various security requirements, threat models, and possible
TAN Trusted Node Authentication attacks have been reviewed to highlight potential vulnerabilities in real-
ROR Random Oracle Model world IoT. The third analyzed key features of authentication and key
MSD Mass Storage Devices agreement such as primitives, system model, and cryptographic opera­
USB Universal Serial Bus
tions to achieve a high level of security efficiency. The fourth considered
HMAC Hash-based message authentication
UAV Unmanned Ariel Vehicles a few key assessments, such as computing service, security re­
OTP One time Password quirements, and communication metrics to obtain user activity and
SSTPI Session-Specific Temporary Information malicious performance. The fifth comprehensively evaluated various
ECC Elliptic Curve Cryptography
cryptosystems and performance factors to determine security re­
ECDH Elliptic Curve Diffie-Hellman
MMIS Multimedia Medical Information System
quirements and to improve service efficiencies. The sixth chose a cloud-
BAN Burrows–Abadi–Needham based environment to discuss the challenges of IoT environments. Also,
MQTT Message Queuing Telemetry Transport a few future directions, including M2M communication, adaptable
network, robust and resilient architecture were discussed to suit the
distributed nature of Modern IoT applications.
intriguing method that the research community has recently investi­
gated. Distributed Data Flow (DDF) was offered as a potential solution to
suit the distributed nature of IoT applications and is now an active
Declaration of Competing Interest
research topic [215]. Responsive programming, based on an informa­
tion flow model, is gaining traction in the IoT community, with many
None.

Fig. 13. Security analysis tools.

26
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

Fig. 14. Research challenges and future directions.

Data availability [12] Z. Liao, X. Pang, J. Zhang, B. Xiong, J. Wang, Blockchain on security and forensics
management in edge computing for iot: a comprehensive survey, IEEE Trans.
Netw. Serv. Manage. (2021).
No data was used for the research described in the article. [13] Oleg, S., IoT: user-Centric, Privacy Security-IoT vulnerabilities might cause
catastrophic disruptions, ranging from privacy breaches to breakdowns of public
ecosystems, https://dzone.com/articles/iot-user-centric-privacy-security,
accessed on 27. 11.2019.
References [14] Sharon F., Security by Design, https://whatis.techtarget.com/definition/security-
by-design, accessed on 29.11.2019.
[1] J. Singh, A. Gimekar, S. Venkatesan, An efficient lightweight authentication [15] N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, N. Ghani, Demystifying IoT
scheme for human-centered industrial Internet of Things, Int. J. Commun. Syst. security: an exhaustive survey on IoT vulnerabilities and a first empirical look on
(2019) e4189. internet-scale IoT exploitations, IEEE Commun. Surveys Tutor. (2019).
[2] S. Roy, P. Pranav, V. Bhattacharjee, Securing the Internet of Things: current and [16] X. Li, J. Peng, J. Niu, F. Wu, J. Liao, K.K.R. Choo, A robust and energy efficient
Future State of the Art. Smart Healthcare Analytics in IoT Enabled Environment, authentication protocol for industrial internet of things, IEEE Internet Things J. 5
Springer, Cham, 2020, pp. 227–246. (3) (2017) 1606–1615.
[3] D.E. Boubiche, S. Athmani, S. Boubiche, H Toral-Cruz, Cybersecurity Issues in [17] S. Hameed, F.I. Khan, B. Hameed, Understanding security requirements and
Wireless Sensor Networks: current Challenges and Solutions, Wireless Personal challenges in the internet of things (IoT): a review, J. Comput. Networks
Commun. (2020) 1–37. Commun. (2019), 2019.
[4] P. Maratha, K. Gupta, A comprehensive and systematized review of energy- [18] W.H. Hassan, Current research on Internet of Things (IoT) security: a survey,
efficient routing protocols in wireless sensor networks, Int J Comput Appl (2019) Comput. Networks 148 (2019) 283–294.
1–18. [19] Kumar R., Tripathi S., Agrawal R. (2020) An Analysis and Comparison of Security
[5] C. Pickering, J. Byrne, The benefits of publishing systematic quantitative Protocols on Wireless Sensor Networks (WSN). In: Das S., Samanta S., Dey N.,
literature reviews for PhD candidates and other early-career researchers, Higher Kumar R. (eds) Design Frameworks for Wireless Networks. Lecture Notes in
Education Res. Develop. 33 (3) (2014) 534–548. Networks and Systems, vol 82. Springer, Singapore.
[6] M.M. Ogonji, G. Okeyo, J.M. Wafula, A survey on privacy and security of Internet [20] M. Sookhak, H. Tang, Y. He, F.R. Yu, Security and privacy of smart cities: a
of Things, Computer Sci. Rev. 38 (2020), 100312. survey, research issues and challenges, IEEE Commun. Surveys Tutor. 21 (2)
[7] M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis, E.K. Markakis, A survey (2018) 1718–1743.
on the internet of things (IoT) forensics: challenges, approaches, and open issues, [21] A. Masood, D.S. Lakew, S. Cho, Security and Privacy Challenges in Connected
IEEE Commun. Surveys Tutor. 22 (2) (2020) 1191–1221. Vehicular Cloud Computing, IEEE Commun. Surveys Tutor. 22 (4) (2020)
[8] A.K. Sikder, G. Petracca, H. Aksu, T. Jaeger, A.S. Uluagac, A survey on sensor- 2725–2764.
based threats and attacks to smart devices and applications, IEEE Commun. [22] E. Benkhelifa, T. Welsh, W. Hamouda, A critical review of practices and
Surveys Tutor. 23 (2) (2021) 1125–1159. challenges in intrusion detection systems for IoT: toward universal and resilient
[9] S.K. Mousavi, A. Ghaffari, S. Besharat, H. Afshari, Security of internet of things systems, IEEE Commun. Surveys Tutor. 20 (4) (2018) 3496–3509.
based on cryptographic algorithms: a survey, Proc. 8th Int. Conf. Transparent [23] W. Rafique, L. Qi, I. Yaqoob, M. Imran, R.U. Rasool, W. Dou, Complementing IoT
Opt. Networks, 5th Eur. Symp. Photonic Cryst., 5th Workshop All-Opt. Routing, services through software defined networking and edge computing: a
3rd Global Opt. Wireless Networking Semin., 2nd COST 270 Workshop Reliab. comprehensive survey, IEEE Commun. Surveys Tutor. 22 (3) (2020) 1761–1804.
Issues Next Gener. Opt. Networks, 2nd Photonic Integr. Compon. Appl. Workshop [24] M. El-hajj, A. Fadlallah, M. Chamoun, A. Serhrouchni, A survey of Internet of
27 (2) (2021) 1515–1555. things (IoT) Authentication schemes, Sensors 19 (5) (2019) 1141.
[10] P.H. Mirzaee, M. Shojafar, H. Cruickshank, R. Tafazolli, Smart Grid Security and [25] A. Mainwaring, D. Culler, J. Polastre, R. Szewczyk, J. Anderson, Wireless sensor
Privacy: from conventional to machine learning issues (Threats and networks for habitat monitoring, in: Proceedings of the 1st ACM international
Countermeasures), IEEE Access (2022). workshop on Wireless sensor networks and applications, 2002, pp. 88–97.
[11] G.D. Samaraweera, J.M. Chang, Security and privacy implications on database [26] T.Y. Youn, Y.H. Park, J. Lim, Weaknesses in an anonymous authentication scheme
systems in Big Data era: a survey, IEEE Trans Knowl Data Eng 33 (1) (2019) for roaming service in global mobility networks, IEEE Commun Lett 13 (7) (2009)
239–258. 471–473.

27
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

[27] M.A. Ferrag, L.A. Maglaras, H. Janicke, J. Jiang, L. Shu, Authentication protocols [57] F. Khandaker, S. Oteafy, H.S. Hassanein, H. Farahat, A functional taxonomy of
for the Internet of things: a comprehensive survey, Secur. Commun. Networks caching schemes: towards guided designs in information-centric networks,
(2017), 2017. Comput. Networks 165 (2019), 106937.
[28] M.A. Ferrag, L. Maglaras, A. Derhab, H. Janicke, Authentication schemes for [58] M.L. Das, Two-factor user authentication in wireless sensor networks, IEEE Trans.
smart mobile devices: threat models, countermeasures, and open research issues, Wireless Commun. 8 (3) (2009) 1086–1090.
Telecommun. Syst. 73 (2) (2020) 317–348. [59] R. Ali, A.K. Pal, S. Kumari, M. Karuppiah, M. Conti, Secure user authentication
[29] S. Kavianpour, B. Shanmugam, S. Azam, M. Zamani, G. Narayana Samy, F. De and key-agreement scheme using wireless sensor networks for agriculture
Boer, A Systematic Literature Review of Authentication in the Internet of Things monitoring, Future Generation Comput. Syst. 84 (2018) 200–215.
for Heterogeneous Devices, J. Comput. Networks Commun. (2019), 2019. [60] B.D. Deebak, F. Al-Turjman, L. Mostarda, Seamless secure anonymous
[30] T. Nandy, M.Y.I.B. Idris, R.M. Noor, M.L.M. Kiah, L.S. Lun, N.B.A. Juma’at, authentication for cloud-based mobile edge computing, Communist Chin. Sci.
S. Bhattacharyya, Review on the security of the Internet of Things authentication Abstr. 87 (2020), 106782.
mechanism, IEEE Access 7 (2019) 151054–151089. [61] L. Lamport, Password authentication with insecure communication, Commun.
[31] A.R. Sfar, E. Natalizio, Y. Challal, Z. Chtourou, A roadmap for security challenges ACM 24 (11) (1981) 770–772.
in the Internet of Things, Digit. Commun. Netw. 4 (2) (2018) 118–137. [62] J. Zhu, J. Ma, A new authentication scheme with anonymity for wireless
[32] A.K. Das, S. Zeadally, D. He, Taxonomy and analysis of security protocols for the environments, IEEE Trans. Broadcast Telev. Receivers 50 (1) (2004) 230–234.
internet of things, Future Generation Comput. Syst. 89 (2018) 110–125. [63] D. He, Y. Gao, S. Chan, C. Chen, J. Bu, An enhanced two-factor user
[33] Somasundaram, R., & Thirugnanam, M. (2020). Review of security challenges in authentication scheme in wireless sensor networks, Ad hoc & sensor wireless
healthcare internet of things. WIRELESS NETWORKS. networks 10 (4) (2010) 361–371.
[34] H. Mrabet, S. Belguith, A. Alhomoud, A. Jemai, A survey of IoT security based on [64] M.K. Khan, K. Alghathbar, Cryptanalysis and security improvements of ‘two-
a layered architecture of sensing and data analysis, Sensors 20 (13) (2020) 3625. factor user authentication in wireless sensor networks, Sensors 10 (3) (2010)
[35] X. Li, J. Niu, M.Z.A. Bhuiyan, F. Wu, M. Karuppiah, S. Kumari, A robust ECC- 2450–2459.
based provable secure authentication protocol with privacy-preserving for [65] T.H. Chen, W.K. Shih, A robust mutual authentication protocol for wireless sensor
industrial Internet of things, IEEE Trans. Ind. Inf. 14 (8) (2017) 3599–3609. networks, ETRI Journal 32 (5) (2010) 704–712.
[36] G. Sharma, S. Kalra, A lightweight multi-factor secure smartcard-based remote [66] B. Vaidya, D. Makrakis, H. Mouftah, Two-factor mutual authentication with a key
user authentication scheme for cloud-IoT applications, J. Inform. Secur. Applic. agreement in wireless sensor networks, Secur. Commun. Networks 9 (2) (2016)
42 (2018) 95–106. 171–183.
[37] F. Wu, L. Xu, S. Kumari, X. Li, J. Shen, K.K.R. Choo, A.K. Das, An efficient [67] W.B. Hsieh, J.S. Leu, A robust user authentication scheme using dynamic identity
authentication and key agreement scheme for multi-gateway wireless sensor in wireless sensor networks, Wireless Personal Commun. 77 (2) (2014) 979–989.
networks in IoT deployment, J. Netw. Comput. Appl. 89 (2017) 72–85. [68] J. Kim, D. Lee, W. Jeon, Y. Lee, D. Won, Security analysis and improvements of
[38] J. Srinivas, D. Mishra, S. Mukhopadhyay, A mutual authentication framework for two-factor mutual authentication with key agreement in wireless sensor
wireless medical sensor networks, J. Med. Syst. 41 (5) (2017) 80. networks, Sensors 14 (4) (2014) 6443–6462.
[39] F. Wang, G. Xu, G. Xu, A provably secure anonymous biometrics-based [69] M. Turkanović, B. Brumen, M. Hölbl, A novel user authentication and key
authentication scheme for wireless sensor networks using chaotic map, IEEE agreement scheme for heterogeneous ad hoc wireless sensor networks, based on
Access 7 (2019) 101596–101608. the Internet of Things notion, Ad Hoc Netw 20 (2014) 96–112.
[40] F. Wei, P. Vijayakumar, J. Shen, R. Zhang, L. Li, A provably secure password- [70] J.J. Yuan, Enhanced two-factor user authentication in wireless sensor networks,
based anonymous authentication scheme for wireless body area networks, Telecommun. Syst. 55 (1) (2014) 105–113.
Communist. Chin.. Sci. Abstr. 65 (2018) 322–331. [71] D. He, N. Kumar, J. Chen, C.C. Lee, N. Chilamkurti, S.S. Yeo, Robust anonymous
[41] M. Wazid, A.K. Das, A.V. Vasilakos, Authenticated key management protocol for authentication protocol for healthcare applications using wireless medical sensor
cloud-assisted body area sensor networks, J. Netw. Comput. Appl. 123 (2018) networks, Multimedia Syst. 21 (1) (2015) 49–60.
112–126. [72] M.S. Farash, M. Turkanović, S. Kumari, M. Hölbl, An efficient user authentication
[42] A. Ostad-Sharif, H. Arshad, M. Nikooghadam, D. Abbasinezhad-Mood, Three and key agreement scheme for heterogeneous wireless sensor networks tailored
party secure data transmission in IoT networks through design of a lightweight for the Internet of Things environment, Ad Hoc Netw 36 (2016) 152–176.
authenticated key agreement scheme, Future Generation Comput. Syst. 100 [73] R. Amin, G.P. Biswas, A secure lightweight scheme for user authentication and
(2019) 882–892. key agreement in multi-gateway based wireless sensor networks, Ad Hoc Netw 36
[43] R. Amin, S.H. Islam, G.P. Biswas, M.K. Khan, L. Leng, N. Kumar, Design of an (2016) 58–80.
anonymity-preserving three-factor authenticated key exchange protocol for [74] Y.K. Ever, Secure-anonymous user Authentication scheme for the e-healthcare
wireless sensor networks, Comput. Networks 101 (2016) 42–62. application using wireless medical sensor networks, IEEE Syst. J. 13 (1) (2018)
[44] P. Mohit, R. Amin, G.P. Biswas, Design of authentication protocol for wireless 456–467.
sensor network-based smart vehicular system, Vehicular Commun. 9 (2017) [75] X. Li, J. Niu, S. Kumari, F. Wu, A.K. Sangaiah, K.K.R. Choo, A three-factor
64–71. anonymous authentication scheme for wireless sensor networks in the Internet of
[45] Q. Jiang, S. Zeadally, J. Ma, D. He, Lightweight three-factor authentication and things environments, J. Netw. Comput. Appl. 103 (2018) 194–204.
key agreement protocol for internet-integrated wireless sensor networks, IEEE [76] D. Singh, B. Kumar, S. Singh, S. Chand, SMAC-AS: MAC based secure
Access 5 (2017) 3376–3392. authentication scheme for wireless sensor network, Wireless Personal Commun.
[46] Q. Jiang, J. Ma, C. Yang, X. Ma, J. Shen, S.A. Chaudhry, Efficient end-to-end 107 (2) (2019) 1289–1308.
authentication protocol for wearable health monitoring systems, Communist [77] S. Yu, J. Lee, K. Lee, K. Park, Y. Park, Secure authentication protocol for wireless
Chin. Sci. Abstr. 63 (2017) 182–195. sensor networks in vehicular communications, Sensors 18 (10) (2018) 3191.
[47] M. Kompara, S.H. Islam, M. Hölbl, A robust and efficient mutual authentication [78] K.-A. Shim, CPAS: an efficient conditional privacy-preserving authentication
and key agreement scheme with untraceability for WBANs, Comput. Networks scheme for vehicular sensor networks, IEEE Trans. Veh. Technol. 61 (4) (2012)
148 (2019) 196–213. 1874–1883.
[48] Y. Yang, L. Wu, G. Yin, L. Li, H. Zhao, A survey on security and privacy issues in [79] J.K. Liu, T.H. Yuen, M.H. Au, W. Susilo, Improvements in an authentication
Internet-of-Things, IEEE Internet Things J. 4 (5) (2017) 1250–1258. scheme for vehicular sensor networks, Expert Syst. Appl. 41 (5) (2014)
[49] Y. Chen, L. López, J.F. Martínez, P. Castillejo, A lightweight privacy protection 2559–2564.
user authentication and key agreement scheme tailored for the Internet of things [80] Deebak, B.D., & Al-Turjman, F. Secure-user sign-in authentication for IoT-based
environment: lightpriauth, J. Sensors (2018), 2018. eHealth systems. Complex Intell. Syst., 1–21.
[50] F. Wu, L. Xu, S. Kumari, X. Li, A. Alelaiwi, A new authenticated key agreement [81] P. Gope, B. Sikdar, Lightweight and privacy-preserving two-factor authentication
scheme based on smart cards providing user anonymity with formal proof, Secur. scheme for IoT devices, IEEE Internet Things J. 6 (1) (2018) 580–589.
Commun. Networks 8 (18) (2015) 3847–3863. [82] E. Lara, L. Aguilar, M.A. Sanchez, J.A. García, Lightweight authentication
[51] F. Wu, X. Li, A.K. Sangaiah, L. Xu, S. Kumari, L. Wu, J. Shen, A lightweight and protocol for M2M communications of resource-constrained devices in industrial
robust two-factor authentication scheme for personalized healthcare systems Internet of Things, Sensors 20 (2) (2020) 501.
using wireless medical sensor networks, Future Generation Comput. Syst. 82 [83] M. Shuai, B. Liu, N. Yu, L. Xiong, Lightweight and secure three-factor
(2018) 727–737. authentication scheme for remote patient monitoring using on-body wireless
[52] C.C. Chang, H.D. Le, A provably secure, efficient, and flexible authentication networks, Secur. Commun. Networks (2019), 2019.
scheme for ad hoc wireless sensor networks, IEEE Trans. Wireless Commun. 15 [84] K. Renuka, S. Kumari, X. Li, Design of a secure three-factor authentication scheme
(1) (2015) 357–366. for smart healthcare, J. Med. Syst. 43 (5) (2019) 133.
[53] M.S. Farooq, S. Riaz, A. Abid, K. Abid, M.A. Naeem, A Survey on the Role of IoT in [85] R. Martínez-Peláez, H. Toral-Cruz, J.R. Parra-Michel, V. García, L.J. Mena, V.
Agriculture for the Implementation of Smart Farming, IEEE Access 7 (2019) G. Félix, A. Ochoa-Brust, An enhanced lightweight IoT-based authentication
156237–156271. scheme in cloud computing circumstances, Sensors 19 (9) (2019) 2098.
[54] R. Giuliano, F. Mazzenga, A. Neri, A.M. Vegni, Security access protocols in IoT [86] D. Wang, P. Wang, C. Wang, Efficient multi-factor user authentication protocol
capillary networks, IEEE Internet Things J. 4 (3) (2016) 645–657. with forward secrecy for real-time data access in WSNs, ACM Transac. Cyber-
[55] J. Soldatos, N. Kefalakis, M. Serrano, M. Hauswirth, Design principles for utility- Phys. Syst. 4 (3) (2020) 1–26.
driven services and cloud-based computing modelling for the Internet of Things, [87] M. Nikooghadam, H. Amintoosi, S.H. Islam, M.F. Moghadam, A provably secure
Int. J. Web Grid Serv. 6 (2–3) (2014) 139–167. and lightweight authentication scheme for Internet of Drones for smart city
[56] A. Singh, A. Payal, S. Bharti, A walkthrough of the emerging IoT paradigm: surveillance, J. Syst. Archit. (2020), 101955.
visualizing inside functionalities, key features, and open issues, J. Netw. Comput. [88] T.Y. Wu, T. Wang, Y.Q. Lee, W. Zheng, S. Kumari, S. Kumar, Improved
Appl. 143 (2019) 111–151. Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System,
Secur. Commun. Networks (2021) 2021.

28
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

[89] R. Amin, N. Kumar, G.P. Biswas, R. Iqbal, V. Chang, A lightweight authentication sessions in the edge-enabled smart cities, J. Inform. Secur. Applic. 58 (2021),
protocol for IoT-enabled devices in distributed Cloud Computing environment, 102683.
Future Generation Comput. Syst. 78 (2018) 1005–1019. [123] Y.K. Ever, A secure authentication scheme framework for mobile-sinks used in the
[90] P. Kumar, L. Chouhan, A privacy and session key-based authentication scheme for Internet of Drones applications, Comput. Commun. 155 (2020) 143–149.
medical IoT networks, Comput Commun 166 (2021) 154–164. [124] P. Kumar, L. Chouhan, A secure authentication scheme for IoT application in
[91] A.G. Reddy, D. Suresh, K. Phaneendra, J.S. Shin, V. Odelu, Provably secure, smart home, Peer Peer Netw. Appl. 14 (1) (2021) 420–438.
Sustain. Cities Soc. 41 (2018) 878–885. [125] J. Mo, H. Chen, A lightweight secure user authentication and key agreement
[92] B.D. Deebak, F. Al-Turjman, Robust Lightweight Privacy-Preserving and Session protocol for wireless sensor networks, Secur. Commun. Networks (2019), 2019.
Scheme Interrogation for Fog Computing Systems, J. Inform. Secur. Applic. 58 [126] G. Yang, R. Chen, Y. Mu, W. Susilo, F. Guo, J. Li, Strongly leakage resilient
(2021), 102689. authenticated key exchange, revisited, Des. Codes Cryptogr 87 (12) (2019)
[93] B.D. Deebak, A.T. Fadi, Lightweight authentication for IoT/Cloud-based forensics 2885–2911.
in intelligent data computing, Future Generation Comput. Syst. 116 (2021) [127] K.L. Noh, E. Serpedin, K. Qaraqe, A new approach for time synchronization in
406–425. wireless sensor networks: pairwise broadcast synchronization, IEEE Trans.
[94] B.D. Deebak, F. Al-Turjman, Smart mutual authentication protocol for cloud Wireless Commun. 7 (9) (2008) 3318–3322.
based medical healthcare systems using Internet of medical things, IEEE J. Sel. [128] X. Wang, J. Zhao, An improved key agreement protocol based on chaos, Commun.
Areas Commun. (2020). Nonlinear Sci. Numer. Simul. 15 (12) (2010) 4052–4057.
[95] B.D. Deebak, Lightweight authentication and key management in mobile-sink for [129] F. Amin, A.H. Jahangir, H. Rasifard, Analysis of public-key cryptography for
smart IoT-assisted systems, Sustain. Cities Soc. 63 (2020), 102416. wireless sensor networks security, World Acad. Sci. Eng. Technol. 41 (2008)
[96] B.D. Deebak, F. Al-Turjman, A smart lightweight privacy preservation scheme for 529–534.
IoT-based UAV communication systems, Comput. Commun. 162 (2020) 102–117. [130] M.T. Hammi, B. Hammi, P. Bellot, A. Serhrouchni, Bubbles of Trust: a
[97] D.B. David, Mutual authentication scheme for multimedia medical information decentralized blockchain-based authentication system for IoT, Comp. Secur. 78
systems, Multimed. Tools Appl. 76 (8) (2017) 10741–10759. (2018) 126–142.
[98] D. He, N. Kumar, J. Chen, C.C. Lee, N. Chilamkurti, S.S. Yeo, Robust anonymous [131] S.R. Moosavi, T.N. Gia, E. Nigussie, A.M. Rahmani, S. Virtanen, H. Tenhunen,
authentication protocol for health-care applications using wireless medical sensor J. Isoaho, End-to-end security scheme for mobility enabled healthcare Internet of
networks, Multimedia Syst. 21 (1) (2015) 49–60. Things, Future Generation Comput. Syst. 64 (2016) 108–124.
[99] F. Wu, L. Xu, S. Kumari, X. Li, An improved and anonymous two-factor [132] H.M. Almohri, L.T. Watson, D. Evans, An attack-resilient architecture for the
authentication protocol for health-care applications with wireless medical sensor Internet of Things, IEEE Trans. Inf. Forensics Secur. 15 (2020) 3940–3954.
networks, Multimedia Syst. 23 (2) (2017) 195–205. [133] Q. Jiang, F. Wei, S. Fu, J. Ma, G. Li, A. Alelaiwi, Robust extended chaotic maps-
[100] G. Sharma, S. Kalra, A lightweight user authentication scheme for cloud-IoT based based three-factor authentication scheme preserving biometric template privacy,
healthcare services, Iran J. Sci. Technol. Trans. A Sci. 43 (1) (2019) 619–636. Nonlinear Dyn. 83 (4) (2016) 2085–2101.
[101] Bertoni, G., Daemen, J., Peeters, M., & Van Assche, G. (2009). Keccak sponge [134] P.M. Rao, P. Saraswathi, Evolving cloud security technologies for social networks.
function family main document. Submission to NIST (Round 2), 3(30), 320–337. Security in IoT Social Networks, Academic Press, 2021, pp. 179–203.
[102] W. Diffie, M.E. Hellman, New directions in cryptography. Democratizing [135] S. Zonouz, A. Houmansadr, R. Berthier, N. Borisov, W. Sanders, Secloud: a cloud-
Cryptography: The Work of Whitfield Diffie and Martin Hellman, 2022, based comprehensive and lightweight security solution for smartphones, Comp.
pp. 365–390. Secur. 37 (2013) 215–227.
[103] Qu, M. (1999). Sec 2: recommended elliptic curve domain parameters. J. [136] S. Raza, L. Wallgren, T. Voigt, SVELTE: real-time intrusion detection in the
Reticuloendothel. Soc., Mississauga, ON, Canada, Tech. Rep. SEC2-Ver-0.6. Internet of Things, Ad Hoc Netw 11 (8) (2013) 2661–2674.
[104] D.J. Bernstein, N. Duif, T. Lange, P. Schwabe, B.Y. Yang, High-speed high-security [137] A. Triantafyllou, P. Sarigiannidis, T.D. Lagkas, Network protocols, schemes, and
signatures, J. Cryptogr. Eng. 2 (2) (2012) 77–89. mechanisms for internet of things (iot): features, open challenges, and trends,
[105] R.L. Rivest, A. Shamir, Y. Tauman, How to leak a secret, in: International Wireless communications and mobile computing (2018), 2018.
conference on the theory and application of cryptology and information security, [138] F. Syed, S.K. Gupta, S. Hamood Alsamhi, M. Rashid, X. Liu, A survey on recent
Springer, Berlin, Heidelberg, 2001, pp. 552–565. optimal techniques for securing unmanned aerial vehicles applications, Transac.
[106] Van Saberhagen, N. (2013). CryptoNote v 2.0. Emerg. Telecommun. Technol. 32 (7) (2021) e4133.
[107] Maxwell, G., & Poelstra, A. (2015). Borromean ring signatures. Accessed: Jun, 8, [139] J. Hunker, C.W. Probst, Insiders and Insider Threats-An Overview of Definitions
2019. and Mitigation Techniques, J. Wirel. Mob. Networks Ubiquitous Comput.
[108] K. Itakura, K. Nakamura, A public-key cryptosystem suitable for digital Dependable Appl. 2 (1) (2011) 4–27.
multisignatures, NEC Res. Develop. (71) (1983) 1–8. [140] B. Farahani, F. Firouzi, V. Chang, M. Badaroglu, N. Constant, K. Mankodiya,
[109] D. Dolev, A. Yao, On the security of public key protocols, IEEE Trans. Inf. Theory Towards fog-driven IoT eHealth: promises and challenges of IoT in medicine and
29 (2) (1983) 198–208. healthcare, Future Generation Comput. Syst. 78 (2018) 659–676.
[110] P. Kocher, J. Jaffe, B. Jun, Differential power analysis, in: Annual international [141] O. Kanoun, S. Bradai, S. Khriji, G. Bouattour, D. El Houssaini, M. Ben Ammar,
cryptology conference, Springer, Berlin, Heidelberg, 1999, pp. 388–397. C. Viehweger, Energy-aware system design for autonomous wireless sensor nodes:
[111] J. Mo, Z. Hu, Y. Lin, Cryptanalysis and Security Improvement of Two a comprehensive review, Sensors 21 (2) (2021) 548.
Authentication Schemes for Healthcare Systems Using Wireless Medical Sensor [142] W. Wei, F. Xu, Q. Li, Mobishare: flexible privacy-preserving location sharing in
Networks, Security and Communication Networks, 2020, p. 2020. mobile online social networks, in: 2012 Proceedings IEEE INFOCOM, IEEE, 2012,
[112] R. Amin, S.H. Islam, G.P. Biswas, M.K. Khan, N. Kumar, A robust and anonymous pp. 2616–2620.
patient monitoring system using wireless medical sensor networks, Future [143] X. Liang, X. Li, T.H. Luan, R. Lu, X. Lin, X. Shen, Morality-driven data forwarding
Generation Comput. Syst. 80 (2018) 483–495. with privacy preservation in mobile social networks, IEEE Trans. Veh. Technol. 61
[113] A. Kumar, H. Om, An enhanced and provably secure authentication protocol (7) (2012) 3209–3222.
using Chebyshev chaotic maps for multi-server environment, Multimed Tools [144] Khan, F.I., & Hameed, S. (2018). Understanding security requirements and
Appl. (2021) 1–27. challenges in internet of things (IoTs): a review. arXiv preprint arXiv:1808.10529.
[114] M. Wazid, A.K. Das, S. Shetty, J. JPC Rodrigues, Y Park, LDAKM-EIoT: lightweight [145] L. Zhu, K. Gai, M. Li, Security and privacy issues in internet of things. Blockchain
device authentication and key management mechanism for edge-based IoT Technology in Internet of Things, Springer, Cham, 2019, pp. 29–40.
deployment, Sensors 19 (24) (2019) 5539. [146] Levy, J.M. (2016). Contemporary Urban Planning. Taylor & Francis.
[115] H.L. Wu, C.C. Chang, L.S. Chen, Secure and anonymous authentication scheme for [147] E.E. Peters, Fractal Market analysis: Applying Chaos Theory to Investment and
the internet of things with pairing, Pervasive Mob. Comput. 67 (2020), 101177. Economics, Vol. 24, John Wiley & Sons, 1994.
[116] K. Mahmood, W. Akram, A. Shafiq, I. Altaf, M.A. Lodhi, S.H. Islam, An enhanced [148] Committee on Gynecologic Practice, Committee Opinion No 701: choosing the
and provably secure multi-factor authentication scheme for Internet-of- route of hysterectomy for benign disease, Obstet. Gynecol. 129 (6) (2017) e155.
Multimedia-Things environments, Communist Chin. Sci. Abstr. 88 (2020), [149] R. Chen, G. Acs, C. Castelluccia, Differentially private sequential data publication
106888. via variable-length n-grams, in: Proceedings of the 2012 ACM conference on
[117] M. Shuai, L. Xiong, C. Wang, N. Yu, A secure authentication scheme with forward Computer and communications security, 2012, pp. 638–649.
secrecy for industrial internet of things using Rabin cryptosystem, Comput. [150] A. Jurcut, T. Niculcea, P. Ranaweera, N.A. Le-Khac, Security considerations for
Commun. 160 (2020) 215–227. Internet of Things: a survey, SN Comp. Sci. 1 (2020) 1–19.
[118] Y. Harbi, Z. Aliouat, A. Refoufi, S. Harous, A. Bentaleb, Enhanced authentication [151] Q.M. Ashraf, M.H. Habaebi, Autonomic schemes for threat mitigation in Internet
and key management scheme for securing data transmission in the internet of of Things, J. Netw. Comput. Appl.. 49 (2015) 112–127.
things, Ad Hoc Netw 94 (2019), 101948. [152] M. Zorzi, A. Gluhak, S. Lange, A. Bassi, From today’s intranet of things to a future
[119] K. Sowjanya, M. Dasgupta, S. Ray, Elliptic Curve Cryptography based internet of things: a wireless-and mobility-related view, IEEE Wirel Commun 17
authentication scheme for Internet of Medical Things, J. Inform. Secur. Applic. 58 (6) (2010) 44–51.
(2021), 102761. [153] B.D. Deebak, F. Al-Turjman, Digital-twin assisted: fault diagnosis using deep
[120] O.O. Olufemi, O.K. Oluwasesan, Faster and efficient cloud-server-aided data de- transfer learning for machining tool condition, Int. J. Intell. Syst. (2021).
duplication scheme with an authenticated key agreement for Industrial Internet- [154] B.D. Deebak, F. Al-Turjman, Secure-user sign-in authentication for IoT-based
of-Things, Internet Things (2021), 100376. eHealth systems, Complex Intell. Syst. (2021) 1–21.
[121] M. Fakroon, M. Alshahrani, F. Gebali, I. Traore, Secure remote anonymous user [155] B.D. Deebak, F. Al-Turjman, A. Nayyar, Chaotic-map based authenticated security
authentication scheme for smart home environment, Internet Things 9 (2020), framework with privacy preservation for remote point-of-care, Multimed. Tools
100158. Appl. 80 (11) (2021) 17103–17128.
[122] Y. Zhang, K. Cheng, F. Khan, R. Alturki, R. Khan, A.U. Rehman, A mutual
authentication scheme for establishing secure device-to-device communication

29
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

[156] A.T. Fadi, B.D. Deebak, Seamless authentication: for IoT-big data technologies in [186] S. Jegadeesan, M. Azees, N.R. Babu, U. Subramaniam, J.D. Almakhles, EPAW:
smart industrial application systems, IEEE Trans. Ind. Inf. 17 (4) (2020) efficient privacy preserving anonymous mutual authentication scheme for
2919–2927. wireless body area networks (WBANs), IEEE Access 8 (2020) 48576–48586.
[157] B.D. Deebak, F. Al-Turjman, Drone of IoT in 6 G wireless communications: [187] S. Ji, Z. Gui, T. Zhou, H. Yan, J. Shen, An efficient and certificateless conditional
technology, challenges, and future aspects. Unmanned Aerial Vehicles in Smart privacy-preserving authentication scheme for wireless body area networks big
Cities, Springer, Cham, 2020, pp. 153–165. data services, IEEE Access 6 (2018) 69603–69611.
[158] B.D. Deebak, F. Al-Turjman, M. Aloqaily, O. Alfandi, IoT-BSFCAN: a smart [188] M. Nikooghadam, H. Amintoosi, S.H. Islam, M.F. Moghadam, A provably secure
context-aware system in IoT-Cloud using mobile-fogging, Future Generation and lightweight authentication scheme for Internet of Drones for smart city
Comput. Syst. 109 (2020) 368–381. surveillance, J. Syst. Archit. 115 (2021), 101955.
[159] B.D. Deebak, F. Al-Turjman, A hybrid secure routing and monitoring mechanism [189] A.K. Das, S. Kumari, V. Odelu, X. Li, F. Wu, X. Huang, Provably Secure User
in IoT-based wireless sensor networks, Ad Hoc Netw 97 (2020), 102022. Authentication and Key Agreement Scheme For Wireless Sensor Networks, 9,
[160] F. Al-Turjman, B.D. Deebak, L. Mostarda, Energy aware resource allocation in Security and Communication Networks, 2016, pp. 3670–3687.
multi-hop multimedia routing via the smart edge device, IEEE Access 7 (2019) [190] J.S. Fu, Y. Liu, H.C. Chao, B.K. Bhargava, Z.J. Zhang, Secure data storage and
151203–151214. searching for industrial IoT by integrating fog computing and cloud computing,
[161] D. BD, F. Al-Turjman, L. Mostarda, A hash-based RFID authentication mechanism IEEE Trans. Ind. Inf. 14 (10) (2018) 4519–4528.
for context-aware management in IoT-based multimedia systems, Sensors 19 (18) [191] Y. Zhou, D. Feng, Side-Channel Attacks: ten Years After Its Publication and the
(2019) 3821. Impacts on Cryptographic Module Security Testing, IACR Cryptol. ePrint Arch.
[162] B.D. Deebak, E. Ever, F. Al-Turjman, Analyzing enhanced real-time uplink (2005) 388, 2005.
scheduling algorithm in 3GPP LTE-advanced networks using multimedia systems, [192] M. Burrows, M. Abadi, R.M. Needham, A logic of authentication, Proc. R Soc.
Transac. Emerg. Telecommun. Technol. 29 (10) (2018) e3443. Lond. A Math Phys. Sci. 426 (1989) 233–271.
[163] D.B. David, Analyzing Traffic Models Using IP Multimedia Server–Client Systems [193] A. Armando, D. Basin, J. Cuellar, M. Rusinowitch, L. Viganò, Avispa: automated
for Consumer Wireless Multimedia System Devices, Phys. Sci. 88 (2) (2018) validation of internet security protocols and applications, ERCIM News 64 (2006).
309–316. [194] Blanchet, B., Cheval, V., Allamigeon, X., & Smyth, B. (2010). ProVerif:
[164] F. Al-Turjman, Y.K. Ever, E. Ever, H.X. Nguyen, D.B. David, Seamless key cryptographic protocol verifier in the formal model.
agreement framework for mobile-sink in IoT based cloud-centric secured public [195] C.J. Cremers, The Scyther Tool: verification, falsification, and analysis of security
safety sensor networks, IEEE Access 5 (2017) 24617–24631. protocols, in: International conference on computer aided verification, Springer,
[165] B.D. Deebak, A Secure-Ware System for Web Server: ensuring platform Berlin, Heidelberg, 2008, pp. 414–418.
interoperability, security, privacy, usability and functionality, Natl. Acad. Sci. [196] V. Rao, K.V. Prema, Light-weight hashing method for user authentication in
Lett. (India) 40 (3) (2017) 157–160. Internet-of-Things, Ad Hoc Netw. 89 (2019) 97–106.
[166] P. Gope, T. Hwang, BSN-Care: a secure IoT-based modern healthcare system using [197] D. Gil, M. Johnsson, H. Mora, J. Szymański, Review of the complexity of
body sensor network, IEEE Sens. J. 16 (5) (2015) 1368–1376. managing big data of the internet of things, complex. (2019), 2019.
[167] J. Srinivas, S. Mukhopadhyay, D. Mishra, Secure and efficient user authentication [198] A. Ragab, G. Selim, A. Wahdan, A. Madani, Robust hybrid lightweight
scheme for multi-gateway wireless sensor networks, Ad Hoc Netw 54 (2017) cryptosystem for protecting IoT smart devices, in: international conference on
147–169. security, privacy and anonymity in computation, communication and storage,
[168] M. Chen, T.F. Lee, J.I. Pan, An Enhanced Lightweight Dynamic Pseudonym Springer, Cham, 2019, pp. 5–19.
Identity Based Authentication and Key Agreement Scheme Using Wireless Sensor [199] A. Ghani, K. Mansoor, S. Mehmood, S.A. Chaudhry, A.U. Rahman, M. Najmus
Networks for Agriculture Monitoring, Sensors 19 (5) (2019) 1146. Saqib, Security and key management in IoT-based wireless sensor networks: an
[169] L. Yang, Z. Zheng, Cryptanalysis and improvement of a biometrics-based authentication protocol using symmetric key, Int. J. Commun. Syst. 32 (16)
authentication and key agreement scheme for multi-server environments, PLoS (2019) e4139.
One 13 (3) (2018), e0194093. [200] S. Yu, K. Park, Y. Park, A secure lightweight three-factor authentication scheme
[170] X. Li, J. Niu, S. Kumari, F. Wu, A.K. Sangaiah, K.K.R. Choo, A three-factor for IoT in cloud computing environment, Sensors 19 (16) (2019) 3598.
anonymous authentication scheme for wireless sensor networks in internet of [201] A.K. Das, A.K. Sutrala, S. Kumari, V. Odelu, M. Wazid, X. Li, An efficient multi-
things environments, J. Netw. Comput. Appl. 103 (2018) 194–204. gateway-based three-factor user authentication and key agreement scheme in
[171] Contributors, M., CEA, S.L., Tao, X., Kovatsch, M., Nicholson, R., & UGA, S.B. hierarchical wireless sensor networks, Secur. Commun. Networks 9 (13) (2016)
(2018). D3. 1 Initial data and capabilities models for cross-platform 2070–2092.
interoperability. [202] G. Sharma, S. Kalra, A secure remote user authentication scheme for smart cities
[172] N.W. Lo, K.H. Yeh, An efficient mutual authentication scheme for EPCglobal class- e-governance applications, J. Reliab. Intell. Environ. 3 (3) (2017) 177–188.
1 generation-2 RFID system, in: International Conference on Embedded and [203] A. Darwish, A.E. Hassanien, Wearable and implantable wireless sensor network
Ubiquitous Computing, Springer, Berlin, Heidelberg, 2007, pp. 43–56. solutions for healthcare monitoring, Sensors 11 (6) (2011) 5561–5595.
[173] X. Li, J. Niu, M.Z.A. Bhuiyan, F. Wu, M. Karuppiah, S. Kumari, A robust ECC- [204] P. Thota, Y. Kim, Implementation and comparison of M2M protocols for Internet
based provable secure authentication protocol with privacy-preserving for the of Things, in: 2016 4th Intl Conf on Applied Computing and Information
industrial Internet of Things, IEEE Trans. Ind. Inf. 14 (8) (2017) 3599–3609. Technology/3rd Intl Conf on Computational Science/Intelligence and Applied
[174] M. Shuai, B. Liu, N. Yu, L. Xiong, C. Wang, Efficient and privacy-preserving Informatics/1st Intl Conf on Big Data, Cloud Computing, Data Science &
authentication scheme for wireless body area networks, J. Inform. Secur. Applic. Engineering (ACIT-CSII-BCD), IEEE, 2016, pp. 43–48.
52 (2020), 102499. [205] D. Kumar, P. Kumar, A. Ashok, Introduction to multimedia big data computing for
[175] X. Li, J. Niu, M.Z.A. Bhuiyan, F. Wu, M. Karuppiah, S. Kumari, A robust ECC- IoT. Multimedia Big Data Computing for IoT Applications, Springer, Singapore,
based provable secure authentication protocol with privacy preserving for 2020, pp. 3–36.
industrial internet of things, IEEE Trans. Ind. Inf. 14 (8) (2017) 3599–3609. [206] W. Yu, F. Liang, X. He, W.G. Hatcher, C. Lu, J. Lin, X. Yang, A survey on the edge
[176] S. Kumari, H. Om, Authentication protocol for wireless sensor networks computing for the Internet of Things, IEEE access 6 (2017) 6900–6919.
applications like safety monitoring in coal mines, Comput Netw 104 (2016) [207] D. Arellanes, K.K. Lau, Evaluating IoT service composition mechanisms for the
137–154. scalability of IoT systems, Future Generation Comput. Syst. 108 (2020) 827–848.
[177] A.K. Das, A.K. Sutrala, V. Odelu, A. Goswami, A secure smartcard-based [208] W. Zhang, D. Lin, H. Zhang, C. Chen, X. Zhou, A lightweight anonymous mutual
anonymous user authentication scheme for healthcare applications using wireless authentication with key agreement protocol on ECC, in: 2017 IEEE Trustcom/
medical sensor networks, Wireless Personal Commun. 94 (3) (2017) 1899–1933. BigDataSE/ICESS, IEEE, 2017, pp. 170–176.
[178] F. Wu, L. Xu, S. Kumari, X. Li, A privacy-preserving and provable user [209] S. Sun, M. Kadoch, L. Gong, B. Rong, Integrating network function virtualization
authentication scheme for wireless sensor networks based on internet of things with SDR and SDN for 4 G/5 G networks, IEEE Netw. 29 (3) (2015) 54–59.
security, J. Ambient Intell. Humaniz Comput. 8 (1) (2017) 101–116. [210] M. Díaz, C. Martín, B. Rubio, State-of-the-art, challenges, and open issues in the
[179] D. Mishra, P. Vijayakumar, V. Sureshkumar, R. Amin, S.H. Islam, P. Gope, integration of Internet of things and cloud computing, J Netw Comput Appl 67
Efficient authentication protocol for secure multimedia communications in IoT- (2016) 99–117.
enabled wireless sensor networks, Multimed. Tools Appl. 77 (14) (2018) [211] P. Porambage, M. Ylianttila, C. Schmitt, P. Kumar, A. Gurtov, A.V. Vasilakos, The
18295–18325. quest for privacy in the internet of things, IEEE Cloud Comput. 3 (2) (2016)
[180] J. Cui, X. Zhang, H. Zhong, Z. Ying, L. Liu, RSMA: reputation System-based 36–45.
Lightweight Message Authentication Framework and Protocol for 5G-enabled [212] E. Borgia, The Internet of Things vision: key features, applications and open
Vehicular Networks, IEEE Internet Things J (2019). issues, Comput. Commun. 54 (2014) 1–31.
[181] H. Zhao, M. Zhang, K. Gao, T. Mao, H. Zhu, A Multi-channel Cooperative [213] D. Airehrour, J. Gutierrez, S.K. Ray, Secure routing for internet of things: a
Demand-Aware Media Access Control Scheme in Vehicular Ad-Hoc Network, survey, J. Netw. Comput. Appl. 66 (2016) 198–213.
Wireless Personal Commun. 104 (1) (2019) 325–337. [214] C.S. Shih, J.J. Chou, K.J. Lin, WuKong: secure Run-Time environment and data-
[182] Y. Zhang, D. He, L. Li, B. Chen, A lightweight authentication and key agreement driven IoT applications for Smart Cities and Smart Buildings, J. Internet Serv. Inf.
scheme for internet of drones, Comput Commun 154 (2020) 455–464. Secur. 8 (2) (2018) 1–17.
[183] C.M. Chen, B. Xiang, Y. Liu, K.H. Wang, A secure authentication protocol for [215] Núñez, P.M.T. (2017). A reactive microservice architectural model with
internet of vehicles, Ieee Access 7 (2019) 12047–12057. asynchronous programming and observable streams as an approach to developing
[184] X. Liu, C. Jin, F. Li, An improved two-layer authentication scheme for wireless iot middleware (Doctoral dissertation, Colorado Technical University).
body area networks, J Med Syst 42 (8) (2018) 1–14.
[185] Y. Xie, S. Zhang, X. Li, Y. Li, Y. Chai, Cascp: efficient and secure certificateless
authentication scheme for wireless body area networks with conditional privacy-
preserving, Secur. Commun. Networks (2019), 2019.

30
P.M. Rao and B.D. Deebak Ad Hoc Networks 146 (2023) 103159

PATRUNI MURALIDHARA RAO obtained the degree of B. B D Deebak received his Ph.D. degree from SASTRA Univer­
Tech (Computer Science and Engineering), JNTUK, Kakinada, sity, Tamilnadu, India. Currently, he is working as an Associate
India, in 2012. He obtained the degree of M.Tech (Software Professor in the Department of Computational Intelligence,
Engineering), JNTUH, Hyderabad, India, in 2014. He is School of Computer Science and Engineering at Vellore Insti­
currently pursuing a doctoral degree in network security at the tute of Technology, Vellore, India. His-areas of research
Vellore Institute of Technology. His-research interests include include Multimedia Networks, Network Security, Internet of
wireless sensor networks and networks security. His-research Things, and Machine Learning. He is an active member in
interests include wireless sensor networks and networks secu­ professional societies like IE (I), CSI, and ISTE. His-research
rity. He is an active member of IEEE and IAENG professional contribution spans over 60 publications in journals, confer­
bodies. His-research contribution spans over 12 publications in ences, books, and book chapters.
journals, conferences, and book chapters.

31

You might also like