Research Article
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
Table 2
Security analysis of the compared schemes.
| Scheme | Proposed scheme | Zhu and Ma [4] | Lee et al. [5] | Wu et al. [6] | Mun et al. [12] |
| Anonymity | Yes | No | No | No | Yes | Perfect forward secrecy | Yes | No | No | No | Yes | Mutual authentication (MU-HA) | Yes | No | No | No | Yes | Mutual authentication (MU-FA) | Yes | No | Yes | Yes | Yes | Replay attack | Yes | Yes | No | No | No | Impersonation attack | Yes | Yes | Yes | Yes | Yes | Disclosure of password | Yes | Yes | No | No | Yes | Man-in-the-middle attack (MU-HA) | Yes | No | No | No | Yes | Man-in-the-middle attack (MU-FA) | Yes | No | Yes | Yes | No |
|
|