|
Scheme | Method | Weakness |
|
Liao and Wang [23] | Multiserver architecture authentication scheme with the dynamic identity concept. | Vulnerable to user and server forgery attacks. |
Hsiang and Shih [24] | The secure dynamic id improvement according to the remote user authentication scheme in a multiserver environment. | Vulnerable to wrong password change, replay attack, and impersonation attack. |
Sood et al. [25] | A secure dynamic identity-based authentication protocol for multiserver architecture. | ā |
Lee et al. [26] | A new dynamic identity authentication scheme employed in a multiserver situation. | Vulnerable to forgery attack and stolen-verifier attack. |
Li et al. [27] | Employing smart cards in a multiserver architecture. | Vulnerable to impersonation attack, offline password guessing attack, etc. |
Leu and Hsieh [28] | Employing smart cards as a secure dynamic id-based remote authentication scheme for distributed systems. | Vulnerable to offline password guessing attack if smart card loss. |
Xue et al. [29] | A pseudonym identity-based authentication with key agreement protocol. | Inadequate identity-hidden feature and vulnerable to the offline password guessing attack. |
Shunmuganathan et al. [30] | Employing smart-card-based remote user authentication. | Vulnerable to replay, offline password guessing, and impersonation attack. |
Zhu [31] | Flexible and password-authenticated key agreement scheme based on chaotic maps for multiple server architecture. | The user tracking attack could affect for multiserver framework. |
Li et al. [32] | Using an improved smart card authentication scheme. | Vulnerable to offline password guessing attack. |
Irshad et al. [33] | Applying the anonymous-based authentication key agreement in the multiserver architecture. | Vulnerable to user tracking and insider attack. |
Maitra et al. [34] | Employing password and smart card: cryptanalysis and design. | Vulnerable to the offline guessing and user tracking attack. |
Amin et al. [35] | A lightweight authentication protocol for IoT-enabled devices in a distributed computing environment. | Vulnerable to the offline guessing attack and does not satisfy audit property. |
Zhou et al. [36] | Employing a lightweight two-factor authentication scheme that consists of one-way hash function and exclusive-or operation with cloud assistance. | ā |
|