Research Article

Data Transmission and Access Protection of Community Medical Internet of Things

Table 2

Key agreement security analysis.

Security condition Scheme
Diffie-HellmanXie [14]KAM

Prevent replay attacking
Forward security
Integrity attacking
Known key security
Prevent wiretap attacking
Prevent MITM attacking
Three-way handshake