Skip to main content
. 2021 Aug 16;16(8):e0256367. doi: 10.1371/journal.pone.0256367

Table 3. Comparison of safety analysis.

Security Our study Lee et al. Ceipidor et al. Thammarat et al. Tung et al.
Confidentiality Yes No No No No
Preventing man-in-the-middle attacks Yes - - Yes Yes
Prevent replay attacks Yes No No Yes Yes
Prevent brute force attacks Yes - - Yes Yes
Integrity Yes No - Yes Yes
Mutual authentication Yes - Yes Yes Yes

Note that the "-" in the table indicates that this study claims that the solution can provide this security attribute, but other studies believe that the solution still lacks this security attribute.