Research Article
An Efficient ECC-Based Authentication Scheme against Clock Asynchronous for Spatial Information Network
Table 2
Security functionality comparisons.
| | Security functionality | Proposed | [22] | [21] |
| | Valid mutual authentication | Yes | Yes | Yes | | Data confidentiality and integrity | Yes | Yes | Yes | | No sensitive tables kept by NCC and user | Yes | Yes | Yes | | Perfect session key secrecy | Yes | Yes | Yes | | User’s privacy | Yes | Yes | Yes | | Protection of the biometric | Yes | No | Yes | | Resist offline password-guessing attack | Yes | No | No | | Against clock asynchronous situation | Yes | No | No |
|
|