Research Article
Research on Lightweight Mutual Authentication for the Product Authorization Chain
Table 2
Security comparisons with other schemes.
| Attack testing | Wang et al.’s [4] | Wen and Li’s [5] | Chang et al.’s [6] | Kumari et al.’s [7] | Wang et al.’s [11] | Kaul and Awasthi’s [8] | Ours |
| Resist offline password guessing attack | ✕ | ✕ | ✕ | ✕ | ✔ | ✕ | ✔ | Resist replay attack | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | ✔ | Resist impersonation attack | ✕ | ✕ | ✕ | ✔ | ✔ | ✔ | ✔ | Resist DoS attack | ✕ | ✕ | ✕ | ✔ | ✕ | ✔ | ✔ | Resist insider attack | ✕ | ✔ | ✕ | ✕ | ✔ | ✔ | ✔ | Resist man in middle attack | ✔ | ✕ | ✔ | ✕ | ✔ | ✔ | ✔ | Secure session key establishment | ✕ | ✔ | ✕ | ✔ | ✕ | ✔ | ✔ |
|
|