Table 1 Comparison of security attributes.
From: A decentralized authentication scheme for smart factory based on blockchain
Security properties | Patel et al.29 | Dang et al.30 | Panda et al.36 | Almadhoun et al.37 | Proposed |
---|---|---|---|---|---|
Mutual authentication | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |
Scalability | \(\checkmark\) | \(\checkmark\) | Â | Â | \(\checkmark\) |
Resists MITM attack | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |
Resists DDOS attack | Â | Â | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |
Resists replay attack | \(\checkmark\) | \(\checkmark\) | Â | \(\checkmark\) | \(\checkmark\) |
Cross domain authentication | Â | Â | \(\checkmark\) | Â | \(\checkmark\) |
Decentralization | Â | Â | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |