Table 3 Relation between various security schemes along with their security features.

From: A lightweight and secure authentication and privacy protection scheme for internet of medical things

S.No

Schemes

Cry Based Scheme

Cert.

Esc-Fre

DoS

TA

F. Rev

Cry Ove

1

17

Identity-based Cryptography

\(\checkmark\)

\(\times\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\times\)

2

18

Certificateless PKC

\(\times\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\times\)

\(\checkmark\)

3

11

Traditional PKC

\(\times\)

\(\times\)

\(\checkmark\)

\(\times\)

\(\checkmark\)

\(\checkmark\)

4

13

Certificate-based PKC

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\times\)

\(\checkmark\)

\(\checkmark\)

5

19

Self-Generated-Certificate PKC

\(\checkmark\)

\(\times\)

\(\checkmark\)

\(\times\)

\(\checkmark\)

\(\checkmark\)

6

[OS]

Proposed scheme

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

\(\checkmark\)

  1. \(\checkmark\): denotes security features found and \(\times\): denotes security features not found