Research Article

An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure

Table 8

Security features comparison of the proposed and related schemes.

Security featuresSchemes
Ours[67][68][69][70][71][72][73]

Mutual authentication
Key agreement
User Untraceability°°
User masquerading attack°
masquerading attack
Man-in-middle attack (MITM)
Parallel session attack
Privileged insider and stolen verifier attack°°
Perfect forward secrecy°
No clock synchronization°°°°°°°

resists, ° not resists, not applicable.