Skip to main content

Research Repository

Advanced Search

Authentication Protocols for Internet of Things: A Comprehensive Survey

Ferrag, Mohamed Amine; Maglaras, Leandros A.; Janicke, Helge; Jiang, Jianmin; Shu, Lei


Mohamed Amine Ferrag

Helge Janicke

Jianmin Jiang

Lei Shu


In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

Journal Article Type Article
Acceptance Date Sep 28, 2017
Online Publication Date Nov 6, 2017
Publication Date Nov 6, 2017
Deposit Date Jan 4, 2023
Publicly Available Date Jan 6, 2023
Journal Security and Communication Networks
Print ISSN 1939-0114
Electronic ISSN 1939-0122
Publisher Wiley
Peer Reviewed Peer Reviewed
Volume 2017
Article Number 6562953
Keywords Internet of Things, Taxonomy, Architecture, Protocol (computers), Internet of Vehicles, Security, Privacy, Internet access, Access control, Sensors
Public URL


You might also like

Downloadable Citations