Research Article

Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks

Table 4

Security attributes comparison with state-of-the-art schemes.

Schemes Security attributes

Scheme [4]NNYYYYYYYYY
Scheme [5]NNYNYYYYNNN
Scheme [6]NNYYYYYYYYY
Scheme [8]NYYYYYYYYYY
Scheme [14]NNYYNYYYNYY
Scheme [15]NNYYNYYYYYY
Our schemeYYYYYYYYYYY

Y, yes; N, no; , forward security; , resist desynchronization attack; , mutual authentication; , session key security; , user anonymity; , resist mobile device loss attack; , resist replay attack; , resist wrong password attack; , resist privileged insider attack; , resist user impersonation attack; , resist off-line password guessing attack.