Research Article
Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things
| Protocols | Amin et al. [40] | Chen et al. [41] | Wu et al. [28] | Sadri and Asaar [13] | Our protocol |
| Reply attack | | | | | | Stolen smart card attack | | | | | | Stolen verifier attack | | | | | | Offline password guessing attack | | | | | | Sensor capture attack | | | | | | Provide perfect forward security | | | | | |
|
|