Research Article
An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure
Table 8
Security features comparison of the proposed and related schemes.
| Security features | Schemes | Ours | [67] | [68] | [69] | [70] | [71] | [72] | [73] |
| Mutual authentication | • | • | • | • | • | • | • | • | Key agreement | • | • | • | • | • | • | • | • | User Untraceability | • | ° | • | • | • | • | ° | • | User masquerading attack | • | • | • | • | • | • | ° | • | masquerading attack | • | • | • | • | • | • | • | • | Man-in-middle attack (MITM) | • | • | • | • | • | • | • | • | Parallel session attack | • | • | • | ≈ | • | • | • | • | Privileged insider and stolen verifier attack | • | • | ° | • | • | • | ° | • | Perfect forward secrecy | • | • | • | • | • | • | ° | • | No clock synchronization | • | ° | ° | ° | ° | ° | ° | ° |
|
|
• resists, ° not resists, ≈ not applicable.
|