Research Article
RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications
Table 4
Comparison of resistance in repelling the threats between RAMHU and existing schemes.
| Attack | He et al. [1] | Giri et al. [17] | Li et al. [6] | Farash et al. [23] | Kumar et al. [24] | Jiang et al. [25] | Rajput et al. [7] | Das et al. [5] | Chandrakar et al. [19] | RAMHU scheme |
| Privileged insider | | ✓ | ✓ | | | ✓ | | ✓ | ✓ | ✓ | Stolen device/application | | | ✓ | | | ✓ | | ✓ | ✓ | ✓ | Replay | ✓ | ✓ | ✓ | ✓ | ✓ | | ✓ | ✓ | ✓ | ✓ | MITM | ✓ | | | ✓ | | ✓ | | ✓ | | ✓ | Guessing | | ✓ | ✓ | | | ✓ | | ✓ | ✓ | ✓ | Client impersonation | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Server impersonation | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | | ✓ | ✓ | ✓ | DoS | | ✓ | ✓ | | | | ✓ | | | ✓ | Change password | | ✓ | ✓ | | | ✓ | | ✓ | ✓ | ✓ | Eavesdropping | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Traceability | ✓ | | ✓ | ✓ | ✓ | ✓ | ✓ | | ✓ | ✓ | Revocation | | | | | | ✓ | ✓ | | | ✓ | Verifier | ✓ | | ✓ | | | ✓ | | ✓ | | ✓ | Leakage | ✓ | | | ✓ | | ✓ | ✓ | ✓ | ✓ | ✓ |
|
|