Research Article
Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT
Table 2
Security properties comparison.
| Attacks/Properties | [14] | [25] | [29] | [30] | Ours |
| Anonymity | Yes | Yes | No | No | Yes | Mutual authentication | Yes | Yes | Yes | Yes | Yes | Forger and impersonation attack | No | Yes | Yes | Yes | Yes | Off-line identity guessing attack | Yes | Yes | No | No | Yes | Sensor node capture attack | Yes | Yes | Yes | Yes | Yes | Smart card loss attack | Yes | Yes | Yes | Yes | Yes | Desynchronization attack | Yes | No | Yes | No | Yes | Stolenāverifier attack | Yes | Yes | Yes | No | Yes | Man-in-middle attack | Yes | Yes | Yes | Yes | Yes | Replay attack | Yes | Yes | No | Yes | Yes | Know-key attack | Yes | Yes | No | No | Yes | Untraceability | Yes | Yes | Yes | Yes | Yes | Perfect forward secrecy | No | No | No | No | Yes |
|
|