Table 3 Relation between various security schemes along with their security features.
From: A lightweight and secure authentication and privacy protection scheme for internet of medical things
S.No | Schemes | Cry Based Scheme | Cert. | Esc-Fre | DoS | TA | F. Rev | Cry Ove |
|---|---|---|---|---|---|---|---|---|
1 | Identity-based Cryptography | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\times\) | |
2 | Certificateless PKC | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\checkmark\) | |
3 | Traditional PKC | \(\times\) | \(\times\) | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | |
4 | Certificate-based PKC | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | |
5 | Self-Generated-Certificate PKC | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | |
6 | [OS] | Proposed scheme | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |