Skip to main content

Table 5 Security comparison among related protocols

From: An elliptic curve cryptosystem-based secure RFID mutual authentication for Internet of things in healthcare environment

Item

Proposed scheme

Alamr [3]

Liao [16]

Sowjanya [19]

Dang [21]

Confidentiality

YES

YES

YES

YES

YES

Data integrity

YES

No

No

Availability

YES

No

YES

No

No

Anonymity

YES

YES

No

YES

No

Forwards security

YES

YES

YES

YES

YES

Location privacy

YES

YES

YES

No

No

Avoiding forgery attack

YES

YES

YES

YES

YES

Avoiding replay attack

YES

YES

YES

YES

YES

Mutual authentication

YES

YES

YES

YES

YES

Avoiding Man-in-the-middle attack

YES

YES

No

YES

YES

Avoiding DoS attack

YES

No

YES

YES

No