Skip to main content
. 2021 Sep 11;75:103311. doi: 10.1016/j.scs.2021.103311

Table 4.

Security challenges in the existing literature comparative analysis with our paper.

Scheme name Authentication Challenges CIA Challenges Authorization Challenges Connectivity Challenges Interoperability Challenges Privacy Challenges Security Challenges
Abir et al. (2020) Yes Partial Yes No No Yes Yes
Ahmed et al. (2018) Yes Yes No No Yes No Yes
Marques et al. (2019) No Partial Yes No No Yes Yes
Somasundaram and Thirugnanam (2020) Yes Yes Yes No No Yes Yes
Baker et al. (2017) No No Yes Yes No Yes Yes
our scheme Yes Yes Yes Yes Yes Yes Yes