From: A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city
Security features | [1] | [12] | [15] | [17] | [26] | [27] | [28] | ours |
---|---|---|---|---|---|---|---|---|
Impersonation attack | √ | × | √ | × | × | √ | √ | √ |
Anonymity and unlinkability | × | × | √ | × | × | × | × | √ |
Verification table stolen attack | √ | √ | √ | √ | √ | × | × | √ |
Password guessing attack | × | × | √ | × | √ | √ | √ | √ |
Known session key security | √ | × | √ | × | √ | √ | √ | √ |
Replay attack | √ | × | √ | × | √ | √ | √ | √ |
Man-in-the-middle attack | √ | × | √ | × | √ | √ | √ | √ |
Perfect forward secrecy | √ | × | × | × | √ | √ | √ | √ |
Session key security | √ | √ | × | √ | √ | √ | √ | √ |
Sensor capture attack | √ | √ | × | √ | √ | √ | √ | √ |