Protocols | Adopted cryptographic operations | Security weaknesses |
---|---|---|
Chuang et al. [33] | Hash function | User impersonation attacks SKD attacks |
Amin et al. [31] | Hash function Smart card | Offline dictionary attacks User anonymity |
Wu et al. [35] | Hash function Chaotic maps Smart card | SSC attacks TVD attacks |
Zhou et al. [43] | Hash function | TVD attacks Impersonation attacks SKD attacks Replay attacks PFS |
Martinez-Pelaez et al. [45] | Hash function Symmetric encryption/decryption | SKD attacks Replay attacks MA |
Fan et al. [37] | RFID Symmetric encryption/decryption | – |
Kang et al. [47] | Hash function | OPG attacks |
Wu et al. [48] | Hash function Smart card | – |
Rangwani et al. [41] | ECC Hash function | – |