(i) Utilized one-way hash function (ii) Dynamic string generating algorithm
(i) Does not resist user traceability attacks (ii) Does not resist desynchronization attacks (iii) Does not resist denial-of-service attacks (iv) Does not resist internal attacks
(i) Does not resist offline identity guessing attacks (ii) Does not resist sensor node impersonation attacks (iii) Does not resist hub node spoofing attacks (iv) Does not provide untraceability (v) Does not resist desynchronization attacks (vi) Does not provide perfect forward security (vii) Does not provide key control
(i) Utilized one-way hash function (ii) Based on bilinear pairings (iii) Based on Diffie–Hellman problem
(i) Does not resist ephemeral secret leakage attacks (ii) Does not resist impersonation attacks (iii) Does not resist known session-specific temporary information attacks (iv) Does not provide anonymity (v) Does not provide pre-verification