Next Article in Journal
Lithium Metal: The Key to Green Transportation
Next Article in Special Issue
An Emotion Speech Synthesis Method Based on VITS
Previous Article in Journal
Dense Semantic Forecasting with Multi-Level Feature Warping
Previous Article in Special Issue
Road Pavement Damage Detection Based on Local Minimum of Grayscale and Feature Fusion
 
 
Review
Peer-Review Record

Key Agreement and Authentication Protocols in the Internet of Things: A Survey

Appl. Sci. 2023, 13(1), 404; https://doi.org/10.3390/app13010404
by Sabina Szymoniak 1,* and Shalini Kesar 2
Reviewer 1:
Reviewer 2: Anonymous
Reviewer 3:
Appl. Sci. 2023, 13(1), 404; https://doi.org/10.3390/app13010404
Submission received: 29 November 2022 / Revised: 20 December 2022 / Accepted: 25 December 2022 / Published: 28 December 2022

Round 1

Reviewer 1 Report

This paper reviews d the latest communication protocols designed to secure authentication processes and agree on session keys in IoT environments. 

 

1 In Section 3, the authors list the relative references about security protocols for Internet of Things. However, this is not a good method for a review. Hence, I suggest that the authors can summarize the characteristics and features about the protocols. The references can be used as examples to support the characteristics.

 

2 In Conclusion, the authors should point out the future direction about the security protocols for Internet of Things based on the summary of this paper. The authors should not list themself directions.

Author Response

Reviewer 1:

This paper reviews d the latest communication protocols designed to secure authentication

processes and agree on session keys in IoT environments.

 

Authors’ response: We wish to thank the reviewer for her/his careful review and her/his

comments and suggested improvements to the paper.

 

1. In Section 3, the authors list the relative references about security protocols for Internet

of Things. However, this is not a good method for a review. Hence, I suggest that the authors

can summarize the characteristics and features about the protocols. The references can be used

as examples to support the characteristics.

 

Authors’ response: Thank you very much for this remark. We extended Section 3 with ap-

propriate information about the characteristics and features of overviewed protocols.

 

2. In Conclusion, the authors should point out the future direction about the security pro-

tocols for Internet of Things based on the summary of this paper. The authors should not list

themself directions.

 

Authors’ response: Thank you very much for this remark. We deleted the paragraph about

our future directions and added four paragraphs describing future directions about the security

protocols for the Internet of Things.

Author Response File: Author Response.pdf

Reviewer 2 Report

The key contribution claimed by the authors are:

"In this article, we have reviewed the latest communication protocols designed to secure authentication processes and agree on session keys in IoT environments. We analyzed the proposed protocols’ security level, vulnerability, and computational and communication costs. We showed our observations describing the requirements that a secure protocol should meet."

The writing, presentation and organization quality of this study is good. Provided reference literature is fine and sufficient discussion is provided in relevant sections. I have some minor suggestions.

i. Is it possible to incorporate any figure to make this review more interesting?

ii. Abstract is fine. Readers can easily understand your key contributions.

iii. Introduction section is well organized.

iv. Section 2 is well discussed and Table 1 is nicely presented.

v. Please add a short summary to introduce Section 3. Provided discussion is sufficient. 

vi. Section 4 is well incorporated with Tables. Readers can easily understand contributions from it.

vii. Abbreviation table must be revised as some abbreviations provided in this study are missing. 

viii. I suggest conclusion should be more precise. So, authors are suggested to revise it.

Author Response

Reviewer 2:

The key contribution claimed by the authors are:

"In this article, we have reviewed the latest communication protocols designed to secure au-

thentication processes and agree on session keys in IoT environments. We analyzed the proposed

protocols’ security level, vulnerability, and computational and communication costs. We showed

our observations describing the requirements that a secure protocol should meet."

The writing, presentation and organization quality of this study is good. Provided reference

literature is fine and sufficient discussion is provided in relevant sections. I have some minor

suggestions.

Authors’ response: We wish to thank the reviewer for her/his careful review and her/his

comments and suggested improvements to the paper.

 

1. Is it possible to incorporate any figure to make this review more interesting?

Authors’ response: Thank you very much for this question. We analysed the whole manuscript

in case of the possibility of adding figures. We decided to add one figure in Section 2. We put

together IoT solutions and typical cyberattacks on IoT systems in this figure. We hope this

figure will make our review more interesting and capture potential readers’ imagination about

threats occurring in IoT systems.

 

2. Abstract is fine. Readers can easily understand your key contributions.

3. Introduction section is well organized.

4. Section 2 is well discussed and Table 1 is nicely presented.

Authors’ response: Thank you very much for these remarks.

 

5. Please add a short summary to introduce Section 3. Provided discussion is sufficient.

Authors’ response: Thank you very much for this remark. We added an appropriate summary

between Sections 2 and 3. Also, according to other Reviewers’ remarks, we extended information

about the characteristics and features of the protocols.

 

6. Section 4 is well incorporated with Tables. Readers can easily understand contributions

from it.

Authors’ response: Thank you very much for this remark.

 

7. Abbreviation table must be revised as some abbreviations provided in this study are

missing.

Authors’ response: Thank you very much for this remark. We added missing abbreviations.

 

8. I suggest conclusion should be more precise. So, authors are suggested to revise it.

Authors’ response: Thank you very much for this remark. We revised the Conclusions. We

deleted the paragraph about our future directions and added four paragraphs describing future

directions about the security protocols for the Internet of Things.

Author Response File: Author Response.pdf

Reviewer 3 Report

The manuscript is well organized and presented, and I recommend for publication.

Author Response

Reviewer 3:

The manuscript is well organized and presented, and I recommend for publication.

Authors’ response: We wish to thank the reviewer for her/his careful review and her/his

comments and suggested improvements to the paper.

Author Response File: Author Response.pdf

Back to TopTop