Table 2. Comparative summary: Security requirements.
Property | Jiang et al. [27] | Wen et al. [28] | Farash et al. [29] | Gope and Hwang [30] | Wu et al. [31] | Chaudhry et al. [32] | Proposed scheme |
---|---|---|---|---|---|---|---|
SR1 | O | O | O | O | O | ||
SR2 | O | O | O | O | O | O | O |
SR3 | O | O | O | ||||
SR4 | O | O | O | O | O | ||
SR5 | O | O | O | O | O | O | O |
SR6 | O | O | O | O | O | ||
SR7 | O | O | O | O | |||
SR8 | O | O | O | ||||
SR9 | O | O | O | O | O | ||
SR10 | O | O | O | O | O | O | O |
SR11 | O | O | O | O | O | ||
SR12 | O | O | O | O | |||
SR13 | O | O | O | O | O | O | O |
SR14 | O | O | |||||
SR15 | O |
SR1: user anonymity; SR2: untraceability; SR3: resistance to stolen-mobile device or smart card attack; SR4: mutual authentication; SR5: session key agreement; SR6: resistance to impersonation attack; SR7: resistance to replay attack; SR8: local user verification process; SR9: resistance to stolen-verifier attack; SR10: resistance to privileged-insider attack; SR11: user-friendly password change; SR12: forward secrecy; SR13: resistance to foreign bypass attack; SR14: does not need time synchronization; SR15: provision of the revocation phase;