Research Article

A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks

Table 7

The comparison of security requirements.

SchemeI1I2I3I4I5I6I7

Wu et al.’s scheme×
Shen et al.’s scheme××
Das et al.’s scheme××
Liu et al.’s scheme×
Proposed scheme

Note. I1: replay attack; I2: impersonation attack; I3: privileged insider attack; I4: secure mutual authentication; I5: message integrity and confidentiality; I6: user privacy; I7: loss of device attack.