Research Article

Provably Secure Crossdomain Multifactor Authentication Protocol for Wearable Health Monitoring Systems

Table 2

Comparison of security attributes.

SchemesThe scheme in [34]The scheme in [35]Our scheme

Preventing stolen mobile device attack
Preventing replay attack
Preventing man-in-the-middle attack
Efficient unauthorized login detection
Anonymity and untraceability
Mutual authentication
Known key security
Perfect forward secrecy
Extensibility
Efficient password and biometric update