Research Article
A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
Table 3
Comparisons of security features.
| Protocols | Wu et al.’s [16] | Jiang et al.’s [17] | Wang et al.’s [18] | Li et al.’s [19] | Our protocol |
| The replay attack | secure | secure | secure | secure | secure |
| The privileged insider attack | secure | secure | secure | secure | secure |
| The GW-node impersonation attack | secure | secure | secure | secure | secure |
| The stolen verifier attack | secure | secure | secure | secure | secure |
| The off-line dictionary attack | secure | secure | secure | secure | secure |
| The compromised sensor node attack | secure | secure | secure | secure | secure |
| Mutual authentication | yes | yes | yes | yes | yes |
| Session key establishment | yes | yes | yes | yes | yes |
| Key privacy | yes | no | yes | no | yes |
| User anonymity | weak | weak | weak | weak | strong |
| Formal security proof | yes | yes | yes | yes | yes |
|
|