Skip to main content
. 2020 Sep 10;20(18):5166. doi: 10.3390/s20185166

Table 7.

Analysis and Comparison of Protocols based on protection against attacks and security goals.

Attacks [2] [3] [23] [24] [25] [26] [27] MAKE-IT
Replay attack
Man in the middle attack × × ×
Modification attack
Impersonation attack
Mutual authentication
Secure secret key × ×
Prevention from unauthorized access
Data confidentiality × × P × × × ×
Identity anonymity P P P P

Acronyms: ✓: Protected against attacks/Compliance to security goals, ×: Vulnerable against attacks/non compliance to security goals, P: Partially achieved.