Skip to main content

Table 8 Comparison of security features

From: A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city

Security features [1] [12] [15] [17] [26] [27] [28] ours
Impersonation attack  ×   ×   × 
Anonymity and unlinkability  ×   ×   ×   ×   ×   × 
Verification table stolen attack  ×   × 
Password guessing attack  ×   ×   × 
Known session key security  ×   × 
Replay attack  ×   × 
Man-in-the-middle attack  ×   × 
Perfect forward secrecy  ×   ×   × 
Session key security  × 
Sensor capture attack  ×