Table 1.
Author | Proposed Scheme | Weakness |
---|---|---|
Wu et al. [9] | For TMIS using a smart card | Impersonation, insider, offline password guessing attacks |
Debiao et al. [10] | Using a smart card and a password | Offline password guessing attacks |
Wu et al. [12] | Secure three-factor scheme for wireless sensor networks | User impersonation attacks and no user anonymity |
Masud et al. [6] | For IoT-based healthcare | Offline-password, replay, privileged insider attacks |