Research Article

Cryptanalysis and Enhancement of an Authenticated Key Agreement Protocol for Dew-Assisted IoT Systems

Table 1

The summary of schemes set in IoT systems.

SchemeSettings applied inLimitations

[11]Wireless sensor networksVulnerable to insider attack
[12]Vulnerable to secret key leakage and forgery attack
[13]Telecare medicine information systemsVulnerable to reflection attack
[14]Vulnerable to replay attack
[15]Vulnerable to offline password attack
[16]Vulnerable to impersonation attack and users’ identity leakage