This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Preprints) and either DOI or URL of the article must be cited.
This survey focuses on authentication methods for the Internet of Things (IoT). There are many different authentication methods that are used in the IT industry but not all of these can be adapted for the IoT. Lightweight and mutual authentication methods will be covered in this paper, alongside two authentication methods that are commonly used in other areas of the industry, rather than the IoT area, which are Kerberos and Group audio-based authentication. The survey will find that Mutual authentication is vital for the IoT and, due to the constraints that are apparent within the IoT devices; the lightweight option is very useful when it comes to dealing with areas like low bandwidth. As a result, there will be gaps that could be further investigated such as the advancement of the IoT technology so that more types of authentication are feasible. A conclusion to this paper is that, by combining different methods of encryption and authentication methods, there are always possibilities to make the proposed protocols more lightweight and secure.
Change to the formatting of the paper and some English language fixes to improve readability and presentation.