Research Article

Enhanced Authentication Protocol for the Internet of Things Environment

Table 2

Comparisons of security.

ProtocolsA1A2A3A4A5A6

Alzahrani and Mahmood [12]
Kumari et al. [20]
Chikouche et al. [13]
Chaudhry et al. [28]
Melki et al. [29]
Panda et al. [30]
 Ours