Research Article
A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks
Table 7
The comparison of security requirements.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Note. I1: replay attack; I2: impersonation attack; I3: privileged insider attack; I4: secure mutual authentication; I5: message integrity and confidentiality; I6: user privacy; I7: loss of device attack. |