Table 7.
Security Features | Sureshkumar et al. [7] | Garg et al. [33] | Hu et al. [5] | Aghapour et al. [10] | Ours |
---|---|---|---|---|---|
Provide Mutual Authentication | O | O | O | O | O |
Resist Replay Attack | O | O | O | O | O |
Resist Smart Meter Impersonation Attack | O | O | O | O | O |
Resist Extraction of the Secret Key | O | O | O | O | O |
Resist Inferrability of the Message | O | O | O | X | O |
Resist Message Altering | O | O | O | X | O |
Resist Injection Attack | O | O | O | O | O |
Provide Forward Secrecy | O | O | O | O | O |
Provide One-time Pad Key | X | O | O | O | O |
Resist Man-in-the-Middle Attack | O | O | O | X | O |