Research Article

An Efficient ECC-Based Authentication Scheme against Clock Asynchronous for Spatial Information Network

Table 2

Security functionality comparisons.

Security functionalityProposed[22][21]

Valid mutual authenticationYesYesYes
Data confidentiality and integrityYesYesYes
No sensitive tables kept by NCC and userYesYesYes
Perfect session key secrecyYesYesYes
User’s privacyYesYesYes
Protection of the biometricYesNoYes
Resist offline password-guessing attackYesNoNo
Against clock asynchronous situationYesNoNo