Research Article
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
Table 2
Security analysis of the compared schemes.
| | Scheme | Proposed scheme | Zhu and Ma [4] | Lee et al. [5] | Wu et al. [6] | Mun et al. [12] |
| | Anonymity | Yes | No | No | No | Yes | | Perfect forward secrecy | Yes | No | No | No | Yes | | Mutual authentication (MU-HA) | Yes | No | No | No | Yes | | Mutual authentication (MU-FA) | Yes | No | Yes | Yes | Yes | | Replay attack | Yes | Yes | No | No | No | | Impersonation attack | Yes | Yes | Yes | Yes | Yes | | Disclosure of password | Yes | Yes | No | No | Yes | | Man-in-the-middle attack (MU-HA) | Yes | No | No | No | Yes | | Man-in-the-middle attack (MU-FA) | Yes | No | Yes | Yes | No |
|
|