Table 4 Security and feature comparison of ChebIoD with recent IoD-specific AKE protocols and other related schemes.
Scheme | Light-weight | Post-quantum | Mutual auth. | Privacy-dyn. IDs | Key update/revocation | Replay-MitM res. | BAN logic proof |
|---|---|---|---|---|---|---|---|
Mahmood et al.32 | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\times\) |
Lee et al.33 | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\times\) |
Chaudhary et al.34 | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\times\) | \(\times\) | \(\checkmark\) | \(\times\) |
Blockchain-based7 | \(\times\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | Partial | \(\checkmark\) | \(\times\) |
PUF-based9 | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\times\) | \(\times\) | \(\checkmark\) | \(\times\) |
ECC-based8 | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\times\) |
ChebIoD (proposed) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |