Research Article
Two-Factor Authentication and Key Agreement Schemes for Smart Home Fingerprint Characteristics
Table 3
Evaluation different schemes using a common metrics.
| | | Evaluation metrics | Protocol | Reference | C1:No password verifier-table | C2: Password friendly | C3:No password exposure | C4: No smart card loss attack | C5: Resistance to known attacks | C6: Sound repairability | C7: Provision of key agreement | C8: No clock synchronization | C9: Timely typo detection | C10: Mutual authentication | C11: User anonymity | C12: Forward secrecy |
| Roy et al. (2018) | [27] | √ | √ | √ | × | × | √ | √ | × | √ | √ | √ | × |
| Islam et al. (2018) | [31] | √ | √ | √ | × | × | × | √ | √ | √ | √ | √ | √ |
| Jia et al. (2019) | [21] | √ | × | √ | √ | √ | × | √ | √ | × | √ | √ | × |
| Patonico et al. (2019) | [22] | × | √ | √ | × | × | × | √ | √ | × | √ | √ | √ |
| Gupta et al. (2019) | [8] | √ | × | × | × | √ | × | √ | × | × | √ | √ | √ |
| Gope et al. (2019) | [40] | √ | × | √ | √ | × | × | √ | × | × | √ | √ | × |
| Li et al. (2020) | [9] | √ | × | × | × | × | × | √ | √ | × | √ | × | √ |
| Shabisha et al. (2020) | [23] | √ | √ | × | × | √ | × | √ | × | × | √ | √ | × |
| Shin-Kwon (2020) | [11] | × | × | √ | √ | √ | √ | √ | × | √ | √ | √ | √ |
| Ali et al. (2020) | [12] | × | √ | √ | √ | × | × | √ | × | × | √ | √ | √ |
| Chen-Chen (2021) | [39] | × | √ | √ | √ | √ | × | √ | √ | √ | √ | √ | √ |
| Masud et al. (2022) | [34] | × | √ | × | × | × | √ | √ | √ | √ | √ | × | √ |
| Ours | | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ | √ |
|
|