Research Article

Blockchain-Based Efficient Device Authentication Protocol for Medical Cyber-Physical Systems

Table 4

Comparison of security requirements.

ā€‰Shi [13]Choi [14]Xue [17]Kumar [19]Our protocol

User anonymity
Resist smart card theft attack
Resist session key attack
Resist sensor energy consumption
Resist internal attacks
Resist offline password guessing
Resist replay attacks
Resistance to man in the middle attacks
Resist user counterfeiting attack
Mutual authentication
Key agreement between user and sensor