Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 2 Security comparison

From: A secure user authentication protocol for sensor network in data capturing

  Benenson et al. [ 7 ] Das [ 10 ] Chen and Shih [ 16 ] Yuan et al. [ 19 ] Yeh et al. [ 17 ] Yoon and Yoo [ 20 ] Ohood et al. [ 21 ] Wenbo and Peng [ 22 ] Ours
Data Confidentiality NP NP NP NP NP NP P NP P
Data Integrity NP P P NP NP P P P P
Password Update NR NP R NP P NR NR P P
Key Agreement NP NP NP NP NP NP P P P
Mutual Authentication NP NP P NP NP P P NP P
Denial Attack No No No Yes No Yes Yes No Yes
DoS Attack No No No No No No Yes No Yes
Compromise Attack Yes No No No No No Yes Yes Yes
Replay Attack Yes Yes Yes Yes No Yes Yes No Yes
Impersonation Attack No Yes Yes No No Yes Yes No Yes
Insider Attack Yes No No No No Yes Yes Yes Yes
Forgery Attack Yes No Yes Yes Yes Yes Yes No Yes
Stolen-Verifier Attack Yes Yes Yes Yes No Yes Yes Yes Yes
Guessing Attack Yes Yes Yes Yes Yes Yes Yes Yes Yes
Man-in-the-Middle Attack No No Yes No No Yes Yes No Yes
  1. Yes: Resist Attack, No: Not Resist Attack, P: Provided, NP: Not Provided, R: Required, NR: Not Required.