Research Article
Trusted Authority Assisted Three-Factor Authentication and Key Agreement Protocol for the Implantable Medical System
Table 2
Comparison of security features.
| | Wang et al.’s scheme [13] | Wazid et al.’s scheme [14] | Our scheme |
| Mutual authentication | × | √ | √ | Known key security | √ | √ | √ | Perfect forward secrecy | √ | √ | √ | User anonymity | √ | √ | √ | Biometric template privacy | √ | √ | √ | Resisting modification attack | √ | √ | √ | Resisting user impersonation attack | × | √ | √ | Resisting server(CN) impersonation attack | √ | × | √ | Resisting man-in-the-middle attack | √ | √ | √ | Resisting stolen-verifier attack | √ | √ | √ | Resisting privileged insider attack | √ | √ | √ | Resisting replay attack | √ | √ | √ | Resisting modification attack | √ | √ | √ | Resisting password guessing attack | √ | × | √ | Resisting secure key agreement | × | × | √ |
|
|