Table 1.
Existing Scheme Based on Privacy Preservation | Key Agreement Properties | Security Attacks | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CH1 | CH2 | CH3 | CH4 | CH5 | CH6 | CH7 | CH8 | CH9 | CH10 | CH11 | CH12 | CH13 | |
Liu et al. [29], 2014 | No | No | No | No | No | No | No | No | No | No | No | No | No |
Jiang et al. [21], 2016 | Yes | No | No | Yes | No | No | Yes | No | Yes | Yes | Yes | No | No |
Yu et al. [44], 2016 | No | No | No | No | No | No | No | No | No | No | No | No | No |
Hu et al. [18], 2017 | No | Yes | No | No | No | No | No | No | No | No | No | No | No |
Gunasinghe et al. [17], 2017 | No | No | No | No | No | No | No | No | No | No | No | No | No |
Liu et al. [30], 2018 | Yes | No | No | No | No | No | Yes | No | No | No | No | No | No |
Li et al. [26], 2018 | Yes | No | No | Yes | No | No | No | No | No | No | No | No | No |
Deebak et al. [12], 2019 | Yes | Yes | No | Yes | Yes | No | No | Yes | No | Yes | No | No | Yes |
Madhusudhan et al. [31], 2020 | Yes | No | No | Yes | Yes | No | Yes | No | Yes | No | Yes | Yes | No |
CH1 Property of Proper Mutual Authentication, CH2 Property of Secure Session-Key, CH3 Property of Known-Key Agreement, CH4 Property of User-Anonymity, CH5 User Friendliness, CH6 Property of Secret Key Disclosure, CH7 Property of Perfect Forward Secrecy, CH8 Resilient Stolen Smart Card Attack, CH9 Resilient to Password-Guessing Attack, CH10 Resilient to Stolen-Verifier Table Attack, CH11 Resilient to Privileged-Insider Attack, CH12 Resilient to Key-Impersonation Attack, CH13 Resilient to Sensor Node Capture Attack.