Advances, Systems and Applications
Attack model | [8] | [13] | [15] | [20] | [23] | [24] | [30] |
---|---|---|---|---|---|---|---|
Insider attack | Yes | No | Yes | Yes | Yes | Yes | Yes |
Mutual authentication | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Offline password guessing attack | Yes | Yes | Yes | Yes | No | No | Yes |
Perfect forward secrecy | Yes | No | Yes | Yes | No | Yes | Yes |
Replay attack | Yes | Yes | No | Yes | No | Yes | Yes |
User impersonation attack | No | No | No | No | No | No | Yes |
Known-key attack | No | No | No | No | No | Yes | Yes |