Table 3. Comparison of safety analysis.
Security | Our study | Lee et al. | Ceipidor et al. | Thammarat et al. | Tung et al. |
---|---|---|---|---|---|
Confidentiality | Yes | No | No | No | No |
Preventing man-in-the-middle attacks | Yes | - | - | Yes | Yes |
Prevent replay attacks | Yes | No | No | Yes | Yes |
Prevent brute force attacks | Yes | - | - | Yes | Yes |
Integrity | Yes | No | - | Yes | Yes |
Mutual authentication | Yes | - | Yes | Yes | Yes |
Note that the "-" in the table indicates that this study claims that the solution can provide this security attribute, but other studies believe that the solution still lacks this security attribute.