Skip to main content
. 2018 Mar 5;13(3):e0193366. doi: 10.1371/journal.pone.0193366

Table 2. Comparative summary: Security requirements.

Property Jiang et al. [27] Wen et al. [28] Farash et al. [29] Gope and Hwang [30] Wu et al. [31] Chaudhry et al. [32] Proposed scheme
SR1 O O X O O X O
SR2 O O O O O O O
SR3 O X X X O X O
SR4 O X X O O O O
SR5 O O O O O O O
SR6 O O X O O X O
SR7 X X X O O O O
SR8 X O X O X X O
SR9 X X O O O O O
SR10 O O O O O O O
SR11 O O X O O X O
SR12 O X X X O O O
SR13 O O O O O O O
SR14 X X X X O X O
SR15 X X X X X X O

SR1: user anonymity; SR2: untraceability; SR3: resistance to stolen-mobile device or smart card attack; SR4: mutual authentication; SR5: session key agreement; SR6: resistance to impersonation attack; SR7: resistance to replay attack; SR8: local user verification process; SR9: resistance to stolen-verifier attack; SR10: resistance to privileged-insider attack; SR11: user-friendly password change; SR12: forward secrecy; SR13: resistance to foreign bypass attack; SR14: does not need time synchronization; SR15: provision of the revocation phase;