Research Article

Cryptanalysis and Enhancement of an Authenticated Key Agreement Protocol for Dew-Assisted IoT Systems

Table 4

Comparison of security features with SMDAS protocol.

Security featuresScheme
[27][28]SMDASe-SMDAS

Mutual authenticationNoYesYesYes
Session key agreementYesYesYesYes
Replay attack resistanceYesNoYesYes
User impersonation attack resistanceNoNoYesYes
User anonymityNoYesNoYes
Forward securityYesYesNoYes