Skip to main content
. 2020 Nov 12;80(11):17103–17128. doi: 10.1007/s11042-020-10134-x

Table 1.

Challenges of Existing Authentication Schemes

Existing Scheme Based on Privacy Preservation Key Agreement Properties Security Attacks
CH1 CH2 CH3 CH4 CH5 CH6 CH7 CH8 CH9 CH10 CH11 CH12 CH13
Liu et al. [29], 2014 No No No No No No No No No No No No No
Jiang et al. [21], 2016 Yes No No Yes No No Yes No Yes Yes Yes No No
Yu et al. [44], 2016 No No No No No No No No No No No No No
Hu et al. [18], 2017 No Yes No No No No No No No No No No No
Gunasinghe et al. [17], 2017 No No No No No No No No No No No No No
Liu et al. [30], 2018 Yes No No No No No Yes No No No No No No
Li et al. [26], 2018 Yes No No Yes No No No No No No No No No
Deebak et al. [12], 2019 Yes Yes No Yes Yes No No Yes No Yes No No Yes
Madhusudhan et al. [31], 2020 Yes No No Yes Yes No Yes No Yes No Yes Yes No

CH1 Property of Proper Mutual Authentication, CH2 Property of Secure Session-Key, CH3 Property of Known-Key Agreement, CH4 Property of User-Anonymity, CH5 User Friendliness, CH6 Property of Secret Key Disclosure, CH7 Property of Perfect Forward Secrecy, CH8 Resilient Stolen Smart Card Attack, CH9 Resilient to Password-Guessing Attack, CH10 Resilient to Stolen-Verifier Table Attack, CH11 Resilient to Privileged-Insider Attack, CH12 Resilient to Key-Impersonation Attack, CH13 Resilient to Sensor Node Capture Attack.