Research Article
Cryptanalysis and Enhancement of an Authenticated Key Agreement Protocol for Dew-Assisted IoT Systems
Table 1
The summary of schemes set in IoT systems.
| Scheme | Settings applied in | Limitations |
| [11] | Wireless sensor networks | Vulnerable to insider attack | [12] | Vulnerable to secret key leakage and forgery attack | [13] | Telecare medicine information systems | Vulnerable to reflection attack | [14] | Vulnerable to replay attack | [15] | Vulnerable to offline password attack | [16] | Vulnerable to impersonation attack and users’ identity leakage |
|
|