Research Article
Cryptanalysis and Enhancement of an Authenticated Key Agreement Protocol for Dew-Assisted IoT Systems
Table 4
Comparison of security features with SMDAS protocol.
| Security features | Scheme | [27] | [28] | SMDAS | e-SMDAS |
| Mutual authentication | No | Yes | Yes | Yes | Session key agreement | Yes | Yes | Yes | Yes | Replay attack resistance | Yes | No | Yes | Yes | User impersonation attack resistance | No | No | Yes | Yes | User anonymity | No | Yes | No | Yes | Forward security | Yes | Yes | No | Yes |
|
|