Research Article

A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability

Table 1

Comparison on security requirements in recent big data-based schemes.

SchemesSecurity requirement

Zhao et al. [20] scheme
Zheng et al. [22] scheme
Zhang et al. [21] scheme
Srinivas et al. [11] scheme
Abdi Nasib Far et al. [13] scheme
Raque et al. [14] scheme
Chan et al. scheme [1]
Liu et al. scheme [2]
Liu’s et al. P-quantum secure scheme [23]
Our proposed scheme
Our P-quantum secure scheme

Note.: mutual authentication and key agreement, : known session-specific temporary information (KSSTI) resilience, : two/three-factor security, : revocability, : resistance to privileged inside attack, : (perfect) forward secrecy, : key compromise impersonation (KCI) resilience, : anonymity and unlinkability, : support user revocation. : achieve, : not achieve, : weak achieve. Password/biometric/smart card-based schemes are represented by blue color.