Research Article

[Retracted] A Provable Secure Cross-Verification Scheme for IoT Using Public Cloud Computing

Table 3

Security features.

Features↓⟶Schemes[2][47][48][49][50][51][52][53][54][35][55]Our

Impersonation attack
Offline password guessing attack-
Man-in-the-middle attack-
Session key disclosure attack
Anonymity and untraceability
Mutual authentication
Replay attack-
Perfect forward secrecy
Stolen device attack

✓: secure, : insecure, —: not considered.