Research Article
Data Transmission and Access Protection of Community Medical Internet of Things
Table 1
Authentication security analysis.
| Security condition | Scheme | Hwang and Yeh [11] | Peyravian and Jeffries [12] | Wang et al. [13] | BDA |
| Prevent DoS attacking | — | | — | | Prevent replay attacking | — | | | | Prevent dictionary attacking | | | | | Prevent server forging | | | | | Prevent gateway-node forging | | — | | | No public key mechanism | | | — | | Hash function | | | | | function | — | — | — | |
|
|