Skip to main content
. 2021 Dec 8;21(24):8206. doi: 10.3390/s21248206

Table 2.

Security analysis-based privacy requirements.

Requirements Bayat et al. [36] Lei Zhang et al. [37] Bayat et al. [38] Pournaghi et al. [39] Bayat et al. [41] SE-CPPA
Message Integrity and Authentication
Identity Privacy-Preserving
Unlinkability
Traceability and Revocation
Resistance to Modification Attacks
Resistance to Replay Attacks
Resistance to Man-in-the-Middle Attacks
Resistance to Impersonation Attacks