Research Article
Provably Secure Crossdomain Multifactor Authentication Protocol for Wearable Health Monitoring Systems
Table 2
Comparison of security attributes.
| Schemes | The scheme in [34] | The scheme in [35] | Our scheme |
| Preventing stolen mobile device attack | ✕ | ✕ | ✓ | Preventing replay attack | ✓ | ✓ | ✓ | Preventing man-in-the-middle attack | ✓ | ✓ | ✓ | Efficient unauthorized login detection | ✓ | ✓ | ✓ | Anonymity and untraceability | ✓ | ✓ | ✓ | Mutual authentication | ✕ | ✓ | ✓ | Known key security | ✓ | ✓ | ✓ | Perfect forward secrecy | ✓ | ✓ | ✓ | Extensibility | ✓ | ✓ | ✓ | Efficient password and biometric update | ✓ | ✓ | ✓ |
|
|