Table 2.
Protocol | ST1 | ST2 | ST3 | ST4 | ST5 | ST6 | ST7 | ST8 | ST9 | ST10 |
---|---|---|---|---|---|---|---|---|---|---|
Alladi 2020 [21] | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | ✕ | 🗸 | 🗸 | ✕ |
Kwon 2021 [45] | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | ✕ | 🗸 | 🗸 | 🗸 |
Chen 2021 [46] | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | ✕ | ✕ | 🗸 | 🗸 | 🗸 |
Raque 2022 [47] | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | ✕ | 🗸 | 🗸 | 🗸 |
Our | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 | 🗸 |
ST1: Mutual authentication; ST2: Identity anonymity and untraceability; ST3: Resist tampering attacks; ST4: Resist repaly attacks; ST5: Resist simulation and forgery attacks; ST6: No clock synchronization; ST7: Resist physical attacks; ST8: Forward and backward security of session keys; ST9: Resist internal attacks; ST10: Resist desynchronization attacks.