Research Article
Blockchain-Based Efficient Device Authentication Protocol for Medical Cyber-Physical Systems
Table 4
Comparison of security requirements.
| ā | Shi [13] | Choi [14] | Xue [17] | Kumar [19] | Our protocol |
| User anonymity | | | | | | Resist smart card theft attack | | | | | | Resist session key attack | | | | | | Resist sensor energy consumption | | | | | | Resist internal attacks | | | | | | Resist offline password guessing | | | | | | Resist replay attacks | | | | | | Resistance to man in the middle attacks | | | | | | Resist user counterfeiting attack | | | | | | Mutual authentication | | | | | | Key agreement between user and sensor | | | | | |
|
|