Table 9.
Security features analysis.
Security Service | Liao [24] |
Zhao [109] |
Alamr [110] |
Naeem [111] |
Dinarvand [112] |
Benssalah [113] |
Zheng [114] |
Yang [115] |
Aloui [116] |
Izza [117] |
---|---|---|---|---|---|---|---|---|---|---|
Confidentiality | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | - | - |
Availability | Yes | Yes | No | Yes | Yes | Yes | Yes | - | Yes | - |
Forward secrecy | Yes | Yes | Yes | - | Yes | Yes | Yes | - | Yes | No |
Mutual authentication | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Anonymity | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No |
Scalability | Yes | Yes | No | Yes | Yes | Yes | Yes | - | Yes | Yes |
Location privacy | Yes | Yes | Yes | Yes | No | Yes | Yes | - | - | No |
Data integrity | Yes | No | No | Yes | Yes | Yes | Yes | Yes | - | - |