Research Article

A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure

Table 4

Security features of related schemes.

Security propertiesZhou et al. [26]Amin et al. [21]Kumari et al. [20]Mo et al. [25]Ghani et al. [35]Martinez-Pelaez et al. [36]Our scheme

User anonymity×
Efficient typo detection××
Resist desynchronization attack××
Resist off-line guessing attack××
Resist session key disclosure attack××
Resist forgery attack×××××
Resist replay attack××
Resist known session-specific temporary information attack×××××
Forward secrecy×××
Three-factor secrecy×
Stolen-verifier attack××
Resist all kinds of session key exposure attacks×××××