Item | Proposed scheme | Farash et al. [7] | Alamr et al. [35] | Zhang and Qi [26] | Zhao [3] | Shen et al. [28] | Liao and Hsiao [36] |
---|---|---|---|---|---|---|---|
Confidentiality | Yes | Yes | Yes | Yes | Yes | Yes | No |
Avoiding insider attack | Yes | Yes | Yes | Yes | Yes | – | No |
Avoiding forgery attack | Yes | Yes | Yes | Yes | Yes | – | No |
Mutual authentication | Yes | Yes | Yes | Yes | Yes | Yes | No |
Forwards security | Yes | Yes | Yes | No | No | Yes | No |
Avoiding replay attack | Yes | Yes | Yes | Yes | Yes | – | Yes |
Masquerade attack | Yes | No | No | No | No | No | No |
Avoiding man-in-the-middle attack | Yes | Yes | Yes | Yes | Yes | – | Yes |