Research Article
New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT
Table 2
Security feature’s comparison.
| | Kumar et al. [33] | He et al [34] | Amin et al [35] | Sharma and Kalra [14] | Ours |
| Mutual authentication | ✓ | ✓ | ✓ | ✓ | ✓ | Data integrity | ✓ | ✓ | ✓ | ✓ | ✓ | No verification table | ✗ | ✗ | ✓ | ✓ | ✓ | Session key exchanging | ✓ | ✓ | ✓ | ✓ | ✓ | DoS attack | ✓ | ✓ | ✓ | ✓ | ✓ | Perfect forward secrecy | ✗ | ✗ | ✗ | ✓ | ✓ | Off-line password guessing attack | ✗ | ✗ | ✗ | ✗ | ✓ | Replay attack | ✗ | ✗ | ✗ | ✓ | ✓ | Insider attack | ✗ | ✗ | ✗ | ✓ | ✓ |
|
|
✓: secured against attack. ✗: not secured against attack.
|