Research Article
A Lightweight Three-Factor Authentication and Key Agreement Scheme for Multigateway WSNs in IoT
Table 3
Comparison of security features.
| | C1 | C2 | C3 | C4 | C5 | C6 | C7 | C8 | C9 | C10 | C11 | C12 |
| Guo et al. [22] | ✓ | ✓ | ✓ | ✓ | × | × | ✓ | ✓ | × | ✓ | ✓ | × | Wu et al. [20] | ✓ | ✓ | × | × | × | × | ✓ | × | × | ✓ | ✓ | × | Srinivas et al. [21] | ✓ | ✓ | × | × | ✓ | × | ✓ | × | × | ✓ | × | × | Amin [19] | ✓ | ✓ | × | × | × | × | ✓ | × | × | ✓ | × | × | Ours | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
|
|
“✓” means the protocol satisfies this property; “×,” the opposite.
|