Research Article
Secure Patient Authentication Framework in the Healthcare System Using Wireless Medical Sensor Networks
Table 3
Attacks and functionalities comparison.
| Attack description | [31] | [32] | [33] | [5] | Our |
| Replay attack | ✓ | ✓ | ✖ | ✖ | ✖ | Masquerade attack | ✓ | ✖ | ✓ | ✓ | ✖ | Privileged insider attack | ✖ | ✖ | ✖ | ✓ | ✖ | Man-in-middle attack | ✓ | ✖ | ✓ | ✖ | ✖ | Malicious attack | ✓ | ✓ | ✓ | ✖ | ✖ | Anonymity violation | ✖ | ✓ | ✓ | ✓ | ✖ | Mutual authentication | ✓ | ✖ | ✓ | ✓ | ✓ | DoS attack | ✖ | ✓ | ✖ | ✓ | ✖ | Offline guessing attack | ✓ | ✓ | ✖ | ✓ | ✖ | Impersonation attack | ✓ | ✖ | ✓ | ✖ | ✖ | Spoofing attack | ✖ | ✓ | ✖ | ✓ | ✖ | Sensor capture attack | ✖ | ✖ | ✖ | ✖ | ✖ |
|
|