Research Article

A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth

Table 1

Comparison of protection of privacy.

SchemesSensor anonymityUser anonymityShared key privacy

Choi et al. [1]××
Shi and Gong [2]××
Chang and Le [3, Scheme 1]×××
Chang and Le [3, Scheme 2]××
Wu et al. [4]×
Das et al. [5]×
Jung et al. [6]××
Fan et al. [7]×××
Amin and Biswas [8]×××
Nam et al. [9]××
Lu et al. [10]×
Zhao et al. [11]××
Hou et al. [12]×××
Farash et al. [13]×××
Turkanović et al. [14]×××
PriAuth