“…From Table 1, it is noticeable that the schemes 10-12,21,23,29-31 do not sustain user anonymity; further, the protocols 10-12,21,23,24,29-31 do not withstand impersonation attack. Also, the schemes 12,21,24,29,30 fail to withstand many security threats which include mutual authentication and key establishment. In terms of providing security features, our scheme outperforms other related schemes.…”