Research Article

Attribute-Based Anonymous Handover Authentication Protocol for Wireless Networks

Table 1

Security comparisons of four protocols.

P1P2P3P4P5P6

He et al.’s protocol [9]NoNoNoNoYesNo
He et al.’s protocol [14]YesNoNoNoYesNo
Xie et al.’s protocol [19]YesNoNoNoYesNo
Our protocolYesYesYesYesYesYes

P1, P2, P3, P4, P5, and P6 denote mutual authentication, user anonymity with nontraceability, session key update, conditional privacy preserving, session key establishment, and user revocation, respectively.