Table 7.
Attacks | [2] | [3] | [23] | [24] | [25] | [26] | [27] | MAKE-IT |
---|---|---|---|---|---|---|---|---|
Replay attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Man in the middle attack | ✓ | × | ✓ | × | ✓ | × | ✓ | ✓ |
Modification attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Impersonation attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Mutual authentication | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Secure secret key | × | × | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Prevention from unauthorized access | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Data confidentiality | × | × | × | × | × | × | ✓ | |
Identity anonymity | ✓ | ✓ | ✓ | ✓ |
Acronyms: ✓: Protected against attacks/Compliance to security goals, ×: Vulnerable against attacks/non compliance to security goals, : Partially achieved.