Skip to main content
. Author manuscript; available in PMC: 2023 Nov 15.
Published in final edited form as: IEEE Internet Things J. 2021 May 26;9(22):22173–22183. doi: 10.1109/jiot.2021.3083731

TABLE II:

Statistical results analysis for different security threats

Type of Attack Our Scheme [14] [20] [27]
Eavesdropping Attack Yes Yes No Yes
Sensing Device Impersonate Attack Yes Yes Yes Yes
Sybil Attacks Yes No Yes No
Spoofing Attacks Yes Yes No Yes
Denial of Service Attack (DoS) Yes Yes Yes No
Spoofing Attacks Yes Yes Yes Yes
Perfect forward and backward secrecy Yes Yes No Yes
Base Station (BS) impersonate Attacks Yes Yes Yes Yes