Research Article

A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks

Table 3

Comparisons of security features.

Protocols Wu et al.’s [16] Jiang et al.’s [17] Wang et al.’s [18] Li et al.’s [19] Our protocol

The replay attacksecure secure secure secure secure

The privileged insider attacksecure secure secure secure secure

The GW-node impersonation attacksecure secure secure secure secure

The stolen verifier attacksecure secure secure secure secure

The off-line dictionary attacksecure secure secure secure secure

The compromised sensor node attacksecure secure secure secure secure

Mutual authenticationyes yes yes yes yes

Session key establishmentyes yes yes yes yes

Key privacyyes no yes no yes

User anonymityweak weak weak weak strong

Formal security proofyes yes yes yes yes