Research Article
Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks
Table 4
Security attributes comparison with state-of-the-art schemes.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Y, yes; N, no; , forward security; , resist desynchronization attack; , mutual authentication; , session key security; , user anonymity; , resist mobile device loss attack; , resist replay attack; , resist wrong password attack; , resist privileged insider attack; , resist user impersonation attack; , resist off-line password guessing attack. |