Research Article
A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure
Table 4
Security features of related schemes.
| Security properties | Zhou et al. [26] | Amin et al. [21] | Kumari et al. [20] | Mo et al. [25] | Ghani et al. [35] | Martinez-Pelaez et al. [36] | Our scheme |
| User anonymity | √ | √ | √ | √ | × | √ | √ | Efficient typo detection | × | √ | √ | √ | × | √ | √ | Resist desynchronization attack | √ | √ | √ | √ | × | × | √ | Resist off-line guessing attack | √ | × | √ | √ | √ | × | √ | Resist session key disclosure attack | √ | × | √ | √ | − | × | √ | Resist forgery attack | × | × | √ | × | × | × | √ | Resist replay attack | × | √ | √ | √ | × | √ | √ | Resist known session-specific temporary information attack | × | × | × | × | − | × | √ | Forward secrecy | × | × | √ | √ | − | × | √ | Three-factor secrecy | − | − | × | − | − | − | √ | Stolen-verifier attack | √ | √ | √ | × | × | √ | √ | Resist all kinds of session key exposure attacks | × | × | × | × | − | × | √ |
|
|