Research Article

Low-Cost Authentication Protocol for D2D Communication in m-Health with Trust Evaluation

Table 2

Comparison of security objectives among protocols.

Security objectivesZhang et al. [13]Mustafa [18]Zhou [16]Proposed protocol

Mutual authenticYesYesYesYes
Trust evaluationNoNoNoYes
ConfidentialityNoYesYesYes
IntegrityYesYesYesYes
PrivacyNoYesYesYes
AnonymityYesNoYesYes
Forward/backward secrecyYesYesYesYes
NonrepudiationYesYesYesYes
Session key securityYesYesYesYes
Resistance to replay attackNoYesYesYes
Resistance to insider attackNoYesYesYes
Resistance to DoS attackNoYesNoYes
Resistance to man-in-the-middle attackNoYesYesYes