Security of devices connected to the internet have recently gained more priority due to cyber-attacks occurring worldwide. Authentication is one of the strongest principles of network security, may it be for small networks such as local servers or for large networks such as central cloud servers. In our research, we try to emphasize on several existing authentication schemes created for constrained devices along with their advantages, disadvantages and primarily their resistance against several attacks. We focus on the resistance of such schemes against the vicious Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks.
展开▼