Table 1 Comparison of security attributes.

From: A decentralized authentication scheme for smart factory based on blockchain

Security properties

Patel et al.29

Dang et al.30

Panda et al.36

Almadhoun et al.37

Proposed

Mutual authentication

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

Scalability

\(\checkmark\)

\(\checkmark\)

  

\(\checkmark\)

Resists MITM attack

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

Resists DDOS attack

  

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

Resists replay attack

\(\checkmark\)

\(\checkmark\)

 

\(\checkmark\)

\(\checkmark\)

Cross domain authentication

  

\(\checkmark\)

 

\(\checkmark\)

Decentralization

  

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)