Skip to main content

Table 8 Comparison of security features

From: A secure and privacy-preserving authentication protocol for wireless sensor networks in smart city

Security features

[1]

[12]

[15]

[17]

[26]

[27]

[28]

ours

Impersonation attack

 × 

 × 

 × 

Anonymity and unlinkability

 × 

 × 

 × 

 × 

 × 

 × 

Verification table stolen attack

 × 

 × 

Password guessing attack

 × 

 × 

 × 

Known session key security

 × 

 × 

Replay attack

 × 

 × 

Man-in-the-middle attack

 × 

 × 

Perfect forward secrecy

 × 

 × 

 × 

Session key security

 × 

Sensor capture attack

 ×