Table 4 Comparison of security parameters.
Properties | Ours | |||||||||
---|---|---|---|---|---|---|---|---|---|---|
Message integrity | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Mutual authentication | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Group key agreement | No | No | No | No | No | No | Yes | Yes | No | Yes |
Conditional privacy | Yes | Yes | No | No | No | Yes | Yes | Yes | Yes | Yes |
Identity privacy | Yes | No | No | Yes | No | No | Yes | No | Yes | Yes |
Location privacy | No | No | No | No | No | No | No | No | Yes | Yes |
Traceability | Yes | No | Yes | No | Yes | No | Yes | No | Yes | Yes |
Untraceability | No | Yes | No | No | No | No | No | No | No | No |
Unlinkability | No | No | No | No | Yes | No | No | Yes | No | Yes |
Anonymity | Yes | Yes | No | Yes | Yes | No | Yes | No | No | Yes |
Confidentiality | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
Non-repudiation | No | No | No | No | Yes | No | No | No | No | Yes |
Key escrow freeness | Yes | Yes | No | No | No | No | No | No | No | Yes |
Forward secrecy | No | No | Yes | No | No | Yes | Yes | No | Yes | Yes |
Backward secrecy | No | Yes | Yes | No | No | Yes | Yes | No | Yes | Yes |
Replay attack | No | Yes | Yes | No | No | Yes | Yes | No | Yes | Yes |
Impersonation attack | Yes | Yes | No | No | No | Yes | No | No | Yes | Yes |
Modification attack | No | No | Yes | No | No | No | No | No | No | Yes |
MiTM attack | Yes | No | Yes | No | No | No | Yes | No | No | Yes |
Coalition Attack | No | No | No | No | No | No | No | Yes | No | Yes |
Key exposure attack | No | No | No | No | No | No | No | No | No | Yes |
DoS attack | No | No | No | No | No | No | No | No | No | Yes |
ESL attack | Yes | Yes | No | No | No | Yes | No | No | No | Yes |
Cloning attack | Yes | No | No | No | No | No | No | No | No | Yes |
Physical/TPD/side-channel attack | Yes | No | No | No | Yes | No | No | No | No | Yes |