Research Article

Analysis and Improvement on an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment

Table 2

Comparison of security.

ā€‰F1F2F3F4F5F6F7

Xue et al. [11]YesNoYesYesYesYesYes
Amin et al. [13]YesYesYesYesYesNoNo
Improved protocolYesYesYesYesYesYesYes

F1: user anonymity; F2: resist password guessing attack; F3: resist replay attack; F4: resist insider attack; F5: resist session key discloser attack; F6: resist impersonation attack; F7: CS knows the real identities of users and cloud servers.