Skip to main content

Advances, Systems and Applications

Table 2 Security comparison

From: A secure user authentication protocol for sensor network in data capturing

 

Benenson et al. [ 7 ]

Das [ 10 ]

Chen and Shih [ 16 ]

Yuan et al. [ 19 ]

Yeh et al. [ 17 ]

Yoon and Yoo [ 20 ]

Ohood et al. [ 21 ]

Wenbo and Peng [ 22 ]

Ours

Data Confidentiality

NP

NP

NP

NP

NP

NP

P

NP

P

Data Integrity

NP

P

P

NP

NP

P

P

P

P

Password Update

NR

NP

R

NP

P

NR

NR

P

P

Key Agreement

NP

NP

NP

NP

NP

NP

P

P

P

Mutual Authentication

NP

NP

P

NP

NP

P

P

NP

P

Denial Attack

No

No

No

Yes

No

Yes

Yes

No

Yes

DoS Attack

No

No

No

No

No

No

Yes

No

Yes

Compromise Attack

Yes

No

No

No

No

No

Yes

Yes

Yes

Replay Attack

Yes

Yes

Yes

Yes

No

Yes

Yes

No

Yes

Impersonation Attack

No

Yes

Yes

No

No

Yes

Yes

No

Yes

Insider Attack

Yes

No

No

No

No

Yes

Yes

Yes

Yes

Forgery Attack

Yes

No

Yes

Yes

Yes

Yes

Yes

No

Yes

Stolen-Verifier Attack

Yes

Yes

Yes

Yes

No

Yes

Yes

Yes

Yes

Guessing Attack

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Yes

Man-in-the-Middle Attack

No

No

Yes

No

No

Yes

Yes

No

Yes

  1. Yes: Resist Attack, No: Not Resist Attack, P: Provided, NP: Not Provided, R: Required, NR: Not Required.