Research Article
Certificateless Authentication Scheme Based on Blockchain in Smart Home Network
Table 2
Types of attacks that each of the compared schemes can resist.
| Protocol | Replay | DDos | Man-in-the-middle | Confidentiality |
| Tyche [11] | Y | N | Y | N | Literature [12] | Y | N | N | Y | Literature [13] | Y | Y | N | Y | BCAS | Y | Y | Y | Y |
|
|