Skip to main content

Table 1 Overview of authentication protocols

From: Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture

Protocols

Adopted cryptographic operations

Security weaknesses

Chuang et al. [33]

Hash function

User impersonation attacks

SKD attacks

Amin et al. [31]

Hash function

Smart card

Offline dictionary attacks

User anonymity

Wu et al. [35]

Hash function

Chaotic maps

Smart card

SSC attacks

TVD attacks

Zhou et al. [43]

Hash function

TVD attacks

Impersonation attacks

SKD attacks

Replay attacks

PFS

Martinez-Pelaez et al. [45]

Hash function

Symmetric encryption/decryption

SKD attacks

Replay attacks

MA

Fan et al. [37]

RFID

Symmetric encryption/decryption

–

Kang et al. [47]

Hash function

OPG attacks

Wu et al. [48]

Hash function

Smart card

–

Rangwani et al. [41]

ECC

Hash function

–