Advances, Systems and Applications
From: A secure user authentication protocol for sensor network in data capturing
Benenson et al. [ 7 ] | Das [ 10 ] | Chen and Shih [ 16 ] | Yuan et al. [ 19 ] | Yeh et al. [ 17 ] | Yoon and Yoo [ 20 ] | Ohood et al. [ 21 ] | Wenbo and Peng [ 22 ] | Ours | |
---|---|---|---|---|---|---|---|---|---|
Data Confidentiality | NP | NP | NP | NP | NP | NP | P | NP | P |
Data Integrity | NP | P | P | NP | NP | P | P | P | P |
Password Update | NR | NP | R | NP | P | NR | NR | P | P |
Key Agreement | NP | NP | NP | NP | NP | NP | P | P | P |
Mutual Authentication | NP | NP | P | NP | NP | P | P | NP | P |
Denial Attack | No | No | No | Yes | No | Yes | Yes | No | Yes |
DoS Attack | No | No | No | No | No | No | Yes | No | Yes |
Compromise Attack | Yes | No | No | No | No | No | Yes | Yes | Yes |
Replay Attack | Yes | Yes | Yes | Yes | No | Yes | Yes | No | Yes |
Impersonation Attack | No | Yes | Yes | No | No | Yes | Yes | No | Yes |
Insider Attack | Yes | No | No | No | No | Yes | Yes | Yes | Yes |
Forgery Attack | Yes | No | Yes | Yes | Yes | Yes | Yes | No | Yes |
Stolen-Verifier Attack | Yes | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes |
Guessing Attack | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Man-in-the-Middle Attack | No | No | Yes | No | No | Yes | Yes | No | Yes |