Research Article
Secure Patient Authentication Framework in the Healthcare System Using Wireless Medical Sensor Networks
Table 3
Attacks and functionalities comparison.
| | Attack description | [31] | [32] | [33] | [5] | Our |
| | Replay attack | ✓ | ✓ | ✖ | ✖ | ✖ | | Masquerade attack | ✓ | ✖ | ✓ | ✓ | ✖ | | Privileged insider attack | ✖ | ✖ | ✖ | ✓ | ✖ | | Man-in-middle attack | ✓ | ✖ | ✓ | ✖ | ✖ | | Malicious attack | ✓ | ✓ | ✓ | ✖ | ✖ | | Anonymity violation | ✖ | ✓ | ✓ | ✓ | ✖ | | Mutual authentication | ✓ | ✖ | ✓ | ✓ | ✓ | | DoS attack | ✖ | ✓ | ✖ | ✓ | ✖ | | Offline guessing attack | ✓ | ✓ | ✖ | ✓ | ✖ | | Impersonation attack | ✓ | ✖ | ✓ | ✖ | ✖ | | Spoofing attack | ✖ | ✓ | ✖ | ✓ | ✖ | | Sensor capture attack | ✖ | ✖ | ✖ | ✖ | ✖ |
|
|