Research Article

Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things

Table 2

Comparisons of security.

ProtocolsAmin et al. [40]Chen et al. [41]Wu et al. [28]Sadri and Asaar [13]Our protocol

Reply attack
Stolen smart card attack
Stolen verifier attack
Offline password guessing attack
Sensor capture attack
Provide perfect forward security