Skip to main content
. 2023 Jan 18;23(3):1122. doi: 10.3390/s23031122

Table 1.

Summary of related works.

Author Proposed Scheme Weakness
Wu et al. [9] For TMIS using a smart card Impersonation, insider, offline password guessing attacks
Debiao et al. [10] Using a smart card and a password Offline password guessing attacks
Wu et al. [12] Secure three-factor scheme for wireless sensor networks User impersonation attacks and no user anonymity
Masud et al. [6] For IoT-based healthcare Offline-password, replay, privileged insider attacks