Research Article
A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability
Table 1
Comparison on security requirements in recent big data-based schemes.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Note.: mutual authentication and key agreement, : known session-specific temporary information (KSSTI) resilience, : two/three-factor security, : revocability, : resistance to privileged inside attack, : (perfect) forward secrecy, : key compromise impersonation (KCI) resilience, : anonymity and unlinkability, : support user revocation. : achieve, : not achieve, : weak achieve. Password/biometric/smart card-based schemes are represented by blue color. |