Research Article

A Cost Effective Identity-Based Authentication Scheme for Internet of Things-Enabled Agriculture

Table 2

Comparison of security performance.

SchemesS1S2S3S4S5S6S7S8

Du et al. [14]NoYesNoNoNoNoNoYes
Boujelben et al. [15]YesYesNoYesNoNoYesYes
Turkanovic et al. [16]YesNoYesYesNoNoNoNo
Mehmood et al. [17]NoNoNoNoNoNoNoNo
Shen et al. [18]NoYesNoYesNoNoNoNo
Wu et al. [19]NoYesNoYesNoYesYesYes
Wang et al. [21]YesYesYesYesYesYesYesNo
Li et al. [24]YesYesNoYesYesYesYesYes
Harbi et al. [25]NoNoYesYesYesYesYesNo
Yuan et al. [26]YesYesNoNoNoNoYesYes
Proposed schemeYesYesYesYesYesYesYesYes

S1: Resists replay attack, S2: Resists forward secrecy attack, S3: Resists DoS attack, S4: Resists eavesdropping attack, S5: Resists impersonation attack, S6: Provides device anonymity, S7: Provides mutual authentication, S8: Resists node capture attack.