Research Article
Data Transmission and Access Protection of Community Medical Internet of Things
Table 2
Key agreement security analysis.
| Security condition | Scheme | Diffie-Hellman | Xie [14] | KAM |
| Prevent replay attacking | | | | Forward security | | | | Integrity attacking | | | | Known key security | | | | Prevent wiretap attacking | | | | Prevent MITM attacking | — | | | Three-way handshake | — | — | |
|
|