Research Article
[Retracted] A Provable Secure Cross-Verification Scheme for IoT Using Public Cloud Computing
| Features↓ | ⟶Schemes | [2] | [47] | [48] | [49] | [50] | [51] | [52] | [53] | [54] | [35] | [55] | Our |
| Impersonation attack | | | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Offline password guessing attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | - | ✓ | Man-in-the-middle attack | | | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | - | ✓ | Session key disclosure attack | | | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Anonymity and untraceability | | | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | | ✓ | ✓ | Mutual authentication | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Replay attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | | ✓ | - | ✓ | Perfect forward secrecy | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | | ✓ | ✓ | ✓ | Stolen device attack | — | — | — | — | — | | | | — | — | — | ✓ |
|
|
✓: secure, : insecure, —: not considered. |