Research Article

A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks

Table 4

Security comparison.

Das et al.’s protocol [32]Chen et al.’s protocol [35]Wu et al.’s protocol [36]Our protocol

A1×
A2
A3×
A4
A5× [34]
A6× [36]× [36]
A7
A8× [34]×
A9× [34]×

A1: known session-specific temporary information attacks; A2: user impersonation attacks; A3: sensor impersonation attacks; A4: man-in-the-middle attacks; A5: stolen smart card attacks; A6: off-line password guessing attacks; A7: privileged-insider attacks; A8: perfect forward secrecy; A9: user anonymity. The “√” denotes that this protocol can resist the attack. The “×” denotes that the protocol cannot resist the attack.