Table 6 Security features comparison.

From: PIA-A secure and efficient identity authentication scheme in telemedicine via the PUF method

Protocol

N1

N2

N3

N4

N5

N6

N7

N8

N9

N10

N11

N12

N13

N14

N15

17

× 

× 

30

× 

× 

× 

31

× 

× 

× 

× 

× 

9

× 

× 

32

× 

× 

PIA

  1. N1-Physician User Anonymity, N2-Session key Secrecy, N3-Three-factor security, N4-Mutual authentication, N5-Mobile Device Node Capture And Password Guess Attacks, N6-Gateway Simulation Attack, N7-Physician User Impersonation Attack, N8-Sensor Devices Impersonation Attack, N9-Desynchronization Attack, N10-Resist Insider privilege attack, N11- Capture Attacks on Medical Sensor Device Nodes, N12-Replay attacks,N13-Man-in-the-middle attack, , N14-Non-traceability. N15-Internal attack.