Research Article

Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System

Table 2

Comparison of security features.

Wang et al.’s scheme [13]Wazid et al.’s scheme [14]Our scheme

Mutual authentication×
Known key security
Perfect forward secrecy
User anonymity
Biometric template privacy
Resisting modification attack
Resisting user impersonation attack×
Resisting server(CN) impersonation attack×
Resisting man-in-the-middle attack
Resisting stolen-verifier attack
Resisting privileged insider attack
Resisting replay attack
Resisting modification attack
Resisting password guessing attack×
Resisting secure key agreement××