Skip to main content
. 2022 Sep 29;22(19):7413. doi: 10.3390/s22197413

Table 2.

Comparison of security features table.

Protocol ST1 ST2 ST3 ST4 ST5 ST6 ST7 ST8 ST9 ST10
Alladi 2020 [21] 🗸 🗸 🗸 🗸 🗸 🗸 🗸 🗸
Kwon 2021 [45] 🗸 🗸 🗸 🗸 🗸 🗸 🗸 🗸 🗸
Chen 2021 [46] 🗸 🗸 🗸 🗸 🗸 🗸 🗸 🗸
Raque 2022 [47] 🗸 🗸 🗸 🗸 🗸 🗸 🗸 🗸 🗸
Our 🗸 🗸 🗸 🗸 🗸 🗸 🗸 🗸 🗸 🗸

ST1: Mutual authentication; ST2: Identity anonymity and untraceability; ST3: Resist tampering attacks; ST4: Resist repaly attacks; ST5: Resist simulation and forgery attacks; ST6: No clock synchronization; ST7: Resist physical attacks; ST8: Forward and backward security of session keys; ST9: Resist internal attacks; ST10: Resist desynchronization attacks.