After analyzing the authentication protocols with the
new design of ours with the threats mentioned, it shows
significant resistant to most of the threats mentioned. The
figure below (figure 8) shows that in average it is resistant
to most threats mentioned in the paper [16]. The figure
shows as in table 1 how each authentication method is
ranked with the grades provided earlier (0 – Poor, 1 – Fair,
2 – Good, 3 – Satisfactory). From all the methods, IAM was
the least immune to the threats because authentication
methods like the OAuth is still a new protocol and its
design has lapses that will be very hazardous to a
consumer.