Skip to main content

Table 2 Security functionality comparison of our protocol with the related protocols

From: An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture

Security functionality

Ours

Kang et al. [10]

Amin et al. [5]

User’s anonymity

YES

YES

YES

User auditability

YES

NO

NO

Simple and secure password change

YES

NO

YES

Resist off-line password guessing attack

YES

NO

YES

Resist impersonation attack

YES

YES

NO

Protection of the biometric

YES

YES

NO

Resist insider attack

YES

YES

YES

Resist replay attack

YES

YES

YES

Resist session key discloser attack

YES

YES

YES