Research Article
A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth
Table 1
Comparison of protection of privacy.
| Schemes | Sensor anonymity | User anonymity | Shared key privacy |
| Choi et al. [1] | × | × | √ | Shi and Gong [2] | × | × | √ | Chang and Le [3, Scheme 1] | × | × | × | Chang and Le [3, Scheme 2] | × | × | √ | Wu et al. [4] | √ | × | √ | Das et al. [5] | √ | × | √ | Jung et al. [6] | √ | × | × | Fan et al. [7] | × | × | × | Amin and Biswas [8] | × | × | × | Nam et al. [9] | × | × | √ | Lu et al. [10] | √ | √ | × | Zhao et al. [11] | √ | × | × | Hou et al. [12] | × | × | × | Farash et al. [13] | × | × | × | Turkanović et al. [14] | × | × | × | PriAuth | √ | √ | √ |
|
|