Research Article
A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth
Table 12
Security feature comparison.
| Security feature | [1] | [3, Scheme 2] | [7] | [9] | PriAuth |
| User anonymity | × | × | √ | √ | √ | Sensor anonymity | × | × | × | × | √ | Shared key privacy | √ | √ | √ | √ | √ | Traceability of user | × | × | √ | √ | √ | Traceability of sensor | × | × | × | × | √ | Loss of synchronization | √ | √ | × | √ | √ | Malicious sensor attack | √ | √ | √ | √ | √ | User impersonation attack | × | √ | √ | √ | √ | Sensor impersonation attack | √ | √ | √ | √ | √ | Replay attack | √ | √ | × | √ | √ | Inside user attack | √ | √ | √ | √ | √ |
|
|