Review Article

Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks

Table 2

Comparisons of security.

Security propertiesFotouhi et al. [22]Kumari et al. [32]Srinivas et al. [33]Gope and Hwang [34]Ours

Perfect forward secrecy
Resists impersonation attacks
Resists offline password-guessing attacks
User anonymity security
Mutual authentication
Resists replay attacks
Resists sensor-capture attacks
Resists known session temporary information attacks×
Resists relay attacks
Resists man-in-the-middle attacks
Provable security