Review Article
Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks
| Security properties | Fotouhi et al. [22] | Kumari et al. [32] | Srinivas et al. [33] | Gope and Hwang [34] | Ours |
| Perfect forward secrecy | ✓ | ✓ | ✓ | ✓ | ✓ | Resists impersonation attacks | ✓ | ✓ | ✓ | ✓ | ✓ | Resists offline password-guessing attacks | ✓ | ✕ | ✕ | ✕ | ✓ | User anonymity security | ✓ | ✓ | ✓ | ✓ | ✓ | Mutual authentication | ✓ | ✓ | ✓ | ✓ | ✓ | Resists replay attacks | ✕ | ✓ | ✓ | ✓ | ✓ | Resists sensor-capture attacks | ✕ | ✕ | ✓ | ✓ | ✓ | Resists known session temporary information attacks | ✓ | × | ✓ | ✓ | ✓ | Resists relay attacks | ✓ | ✓ | ✓ | ✓ | ✓ | Resists man-in-the-middle attacks | ✓ | ✕ | ✓ | ✓ | ✓ | Provable security | ✕ | ✕ | ✕ | ✕ | ✓ |
|
|