Research Article
A Cost Effective Identity-Based Authentication Scheme for Internet of Things-Enabled Agriculture
Table 2
Comparison of security performance.
| Schemes | S1 | S2 | S3 | S4 | S5 | S6 | S7 | S8 |
| Du et al. [14] | No | Yes | No | No | No | No | No | Yes | Boujelben et al. [15] | Yes | Yes | No | Yes | No | No | Yes | Yes | Turkanovic et al. [16] | Yes | No | Yes | Yes | No | No | No | No | Mehmood et al. [17] | No | No | No | No | No | No | No | No | Shen et al. [18] | No | Yes | No | Yes | No | No | No | No | Wu et al. [19] | No | Yes | No | Yes | No | Yes | Yes | Yes | Wang et al. [21] | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | Li et al. [24] | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | Harbi et al. [25] | No | No | Yes | Yes | Yes | Yes | Yes | No | Yuan et al. [26] | Yes | Yes | No | No | No | No | Yes | Yes | Proposed scheme | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
|
S1: Resists replay attack, S2: Resists forward secrecy attack, S3: Resists DoS attack, S4: Resists eavesdropping attack, S5: Resists impersonation attack, S6: Provides device anonymity, S7: Provides mutual authentication, S8: Resists node capture attack.
|