Research Article
A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks
Table 5
Comparison of security properties.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
F: feature. F1: provide three-factor security. F2: resistance to user impersonation attack. F3: resistance to GWN impersonation attack. F4: resistance to sensor impersonation attack. F5: resistance to KSSTI attack. F6: perfect forward and backward secrecy. F7: resistance to replay attack. F8: resistance to privileged insider attack. F9: resistance to sensor capture attack. F10: resistance to many logged-in users with the same login-ID attack. F11: resistance to man-in-the-middle attack. F12: user anonymity. F13: mutual authentication and key agreement. |