Research Article
A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things
Table 2
Comparison of our scheme and related schemes in attack/properties.
| Attacks/properties | [19] | [20] | [21] | [23] | [24] | Ours |
| Privileged-insider attack | ✓ | ✗ | ✓ | ✓ | ✓ | ✓ | Offline password guessing attack | ✓ | ✗ | ✓ | ✓ | ✓ | ✓ | Denial-of-service attack | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | Forger and impersonation attack | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ | Replay attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Man-in-middle attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Smart card loss attack | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ | Sensor node capture attack | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | Stolen‐verifier attack | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | Desynchronization attack | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | Perfect forward secrecy | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | Identity anonymity | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | Mutual authentication | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | Untraceability | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ |
|
|
✓, resist (attacks)/possess (properties); ✗, suffer (attacks)/no (properties).
|