Research Article

New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT

Table 2

Security feature’s comparison.

Kumar et al. [33]He et al [34]Amin et al [35]Sharma and Kalra [14]Ours

Mutual authentication
Data integrity
No verification table
Session key exchanging
DoS attack
Perfect forward secrecy
Off-line password guessing attack
Replay attack
Insider attack

✓: secured against attack. ✗: not secured against attack.