Research Article
Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation
Table 2
Comparison of security objectives among protocols.
| Security objectives | Zhang et al. [13] | Mustafa [18] | Zhou [16] | Proposed protocol |
| Mutual authentic | Yes | Yes | Yes | Yes | Trust evaluation | No | No | No | Yes | Confidentiality | No | Yes | Yes | Yes | Integrity | Yes | Yes | Yes | Yes | Privacy | No | Yes | Yes | Yes | Anonymity | Yes | No | Yes | Yes | Forward/backward secrecy | Yes | Yes | Yes | Yes | Nonrepudiation | Yes | Yes | Yes | Yes | Session key security | Yes | Yes | Yes | Yes | Resistance to replay attack | No | Yes | Yes | Yes | Resistance to insider attack | No | Yes | Yes | Yes | Resistance to DoS attack | No | Yes | No | Yes | Resistance to man-in-the-middle attack | No | Yes | Yes | Yes |
|
|