Research Article

Two-Factor Authentication and Key Agreement Schemes for Smart Home Fingerprint Characteristics

Table 3

Evaluation different schemes using a common metrics.

Evaluation metrics
ProtocolReferenceC1:No password verifier-tableC2: Password friendlyC3:No password exposureC4: No smart card loss attackC5: Resistance to known attacksC6: Sound repairabilityC7: Provision of key agreementC8: No clock synchronizationC9: Timely typo detectionC10: Mutual authenticationC11: User anonymityC12: Forward secrecy

Roy et al. (2018)[27]××××

Islam et al. (2018)[31]×××

Jia et al. (2019)[21]××××

Patonico et al. (2019)[22]×××××

Gupta et al. (2019)[8]××××××

Gope et al. (2019)[40]××××××

Li et al. (2020)[9]×××××××

Shabisha et al. (2020)[23]××××××

Shin-Kwon (2020)[11]×××

Ali et al. (2020)[12]×××××

Chen-Chen (2021)[39]××

Masud et al. (2022)[34]×××××

Ours