Research Article
An Efficient ECC-Based Authentication Scheme against Clock Asynchronous for Spatial Information Network
Table 2
Security functionality comparisons.
| Security functionality | Proposed | [22] | [21] |
| Valid mutual authentication | Yes | Yes | Yes | Data confidentiality and integrity | Yes | Yes | Yes | No sensitive tables kept by NCC and user | Yes | Yes | Yes | Perfect session key secrecy | Yes | Yes | Yes | User’s privacy | Yes | Yes | Yes | Protection of the biometric | Yes | No | Yes | Resist offline password-guessing attack | Yes | No | No | Against clock asynchronous situation | Yes | No | No |
|
|