Research Article
Data Transmission and Access Protection of Community Medical Internet of Things
Table 2
Key agreement security analysis.
| | Security condition | Scheme | | Diffie-Hellman | Xie [14] | KAM |
| | Prevent replay attacking | | | | | Forward security | | | | | Integrity attacking | | | | | Known key security | | | | | Prevent wiretap attacking | | | | | Prevent MITM attacking | — | | | | Three-way handshake | — | — | |
|
|