Research Article

A Privacy Protection User Authentication and Key Agreement Scheme Tailored for the Internet of Things Environment: PriAuth

Table 12

Security feature comparison.

Security feature[1] [3, Scheme 2][7][9]PriAuth

User anonymity××
Sensor anonymity××××
Shared key privacy
Traceability of user××
Traceability of sensor××××
Loss of synchronization×
Malicious sensor attack
User impersonation attack×
Sensor impersonation attack
Replay attack×
Inside user attack