Table 5 Functional and security features.
Proposed | |||||||
---|---|---|---|---|---|---|---|
Security features | |||||||
Mutual authentication | √ | √ | √ | √ | √ | × | √ |
Key agreement | √ | √ | √ | √ | √ | √ | √ |
Backward key secrecy | × | √ | √ | × | √ | √ | √ |
Forward key secrecy | × | √ | √ | × | √ | √ | √ |
Anonymity | √ | √ | × | √ | √ | √ | √ |
Untraceability | √ | √ | × | √ | × | √ | √ |
Password change | × | √ | × | √ | × | × | √ |
Formal verification | √ | √ | √ | √ | √ | √ | √ |
Resilient against | |||||||
De-synchronization | × | × | × | × | × | × | √ |
Denial of service | × | × | × | √ | √ | × | √ |
Eavesdropping | × | × | × | × | × | × | √ |
Session hijacking | × | × | × | × | × | × | √ |
KSSTI | × | × | × | × | √ | × | √ |
Replays | √ | √ | √ | × | × | × | √ |
Forgery | × | × | × | × | × | × | √ |
MitM | √ | × | √ | × | √ | × | √ |
Privileged insider | √ | × | √ | × | √ | × | √ |
Physical | √ | × | √ | √ | √ | √ | √ |
Side-channeling | × | × | × | × | × | × | √ |
Impersonation | √ | √ | √ | × | √ | × | √ |
√ Supported × Not supported or not considered |