Research Article

A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things

Table 2

Comparison of our scheme and related schemes in attack/properties.

Attacks/properties[19][20][21][23][24]Ours

Privileged-insider attack
Offline password guessing attack
Denial-of-service attack
Forger and impersonation attack
Replay attack
Man-in-middle attack
Smart card loss attack
Sensor node capture attack
Stolen‐verifier attack
Desynchronization attack
Perfect forward secrecy
Identity anonymity
Mutual authentication
Untraceability

✓, resist (attacks)/possess (properties); ✗, suffer (attacks)/no (properties).