Research Article

A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks

Table 5

Comparison of security properties.

ā€‰[26][29][50][41][44][45][49]Ours

F1N/AN/ANoNoYesNoYesYes
F2NoNoNoNoYesNoNoYes
F3YesYesYesYesYesYesYesYes
F4YesYesYesYesYesYesYesYes
F5NoNoNoNoNoYesYesYes
F6NoYesNoYesYesYesYesYes
F7NoNoYesNoYesNoNoYes
F8YesNoYesYesNoYesNoYes
F9YesYesYesYesYesYesYesYes
F10YesNoYesNoYesYesYesYes
F11YesYesYesYesYesNoYesYes
F12NoNoYesYesYesYesYesYes
F13YesYesYesYesYesYesYesYes

F: feature. F1: provide three-factor security. F2: resistance to user impersonation attack. F3: resistance to GWN impersonation attack. F4: resistance to sensor impersonation attack. F5: resistance to KSSTI attack. F6: perfect forward and backward secrecy. F7: resistance to replay attack. F8: resistance to privileged insider attack. F9: resistance to sensor capture attack. F10: resistance to many logged-in users with the same login-ID attack. F11: resistance to man-in-the-middle attack. F12: user anonymity. F13: mutual authentication and key agreement.