Research Article
[Retracted] TC-PSLAP: Temporal Credential-Based Provably Secure and Lightweight Authentication Protocol for IoT-Enabled Drone Environments
Table 4
Comparison of functionality features.
| Requirements | [15] | [16] | [20] | [25] | [24] | Ours |
| Perfect forward secrecy | | | | | | | Anonymity | | | | | | | Stolen verifier attack | | | | | | | Replay attack | | | | | | | User impersonation attack | | | | | | | Drone impersonation attack | | | | | | | Man-in-the-middle attack | | | | | | | Insider attack | | | | | | | Session key agreement | | | | | | | Formal verification | | | | | | | Mutual authentication | | | | | | | Control server impersonation attack | | | | | | | Stolen mobile device/smart card attack | | | | | | | Untraceability | | | | | | | Drone/device capture attack | | | | | | | DoS attack | | | | | | | Forgery attack | | | | | | | Secret leakage | | | | | | |
|
|