Research Article

Certificateless Authentication Scheme Based on Blockchain in Smart Home Network

Table 2

Types of attacks that each of the compared schemes can resist.

ProtocolReplayDDosMan-in-the-middleConfidentiality

Tyche [11]YNYN
Literature [12]YNNY
Literature [13]YYNY
BCASYYYY