Research Article

Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure

Table 2

Comparisons of security.

ProtocolsA1A2A3A4A5A6

Rana et al. [19]
Kaul and Awasthi [18]
Xue et al. [29]
Lin et al. [30]
Chang et al. [17]
Kumari et al. [16]
Ours