Research Article
A Lightweight Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: LightPriAuth
Table 9
Security feature comparison.
| Security feature | Wu et al. [9] | Wu et al. [14] | Chang and Le [11] | Chen et al. [1] | LightPriAuth |
| User anonymity | ✓ | ✓ | ✓ | ✓ | ✓ | User being tracked | ✓ | X | X | ✓ | ✓ | Sensor anonymity | ✓ | X | X | ✓ | ✓ | User anonymity to sensor | X | ✓ | ✓ | ✓ | ✓ | Loss of synchronization | ✓ | X | ✓ | ✓ | ✓ | With timestamp | X | X | ✓ | ✓ | ✓ | Offline dictionary attack | X | X | X | X | ✓ | Computation cost (ms) | 29.9432 | 29.424 | 29.42 | 44.1234 | 29.4184 | Communication cost (bytes) | 564 | 624 | 412 | 492 | 396 |
|
|