Table 1: Performance analysis.

FunctionsGuo et al. (2013) [9]Han et al. (2013) [10]Sheu et al. (2014) [1]Park (2015) [4]Proposed approach

Identification & authenticationNoYesNoYesYes
AuthorizationNoYesNoYesYes
ConfidentialityYesYesNoYesYes
IntegrityNoNoYesNoYes
Antiattack capabilityWeakMediumWeakMediumStrong