Review Article
Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks
| | Security properties | Fotouhi et al. [22] | Kumari et al. [32] | Srinivas et al. [33] | Gope and Hwang [34] | Ours |
| | Perfect forward secrecy | ✓ | ✓ | ✓ | ✓ | ✓ | | Resists impersonation attacks | ✓ | ✓ | ✓ | ✓ | ✓ | | Resists offline password-guessing attacks | ✓ | ✕ | ✕ | ✕ | ✓ | | User anonymity security | ✓ | ✓ | ✓ | ✓ | ✓ | | Mutual authentication | ✓ | ✓ | ✓ | ✓ | ✓ | | Resists replay attacks | ✕ | ✓ | ✓ | ✓ | ✓ | | Resists sensor-capture attacks | ✕ | ✕ | ✓ | ✓ | ✓ | | Resists known session temporary information attacks | ✓ | × | ✓ | ✓ | ✓ | | Resists relay attacks | ✓ | ✓ | ✓ | ✓ | ✓ | | Resists man-in-the-middle attacks | ✓ | ✕ | ✓ | ✓ | ✓ | | Provable security | ✕ | ✕ | ✕ | ✕ | ✓ |
|
|