TABLE II:
Statistical results analysis for different security threats
Type of Attack | Our Scheme | [14] | [20] | [27] |
---|---|---|---|---|
Eavesdropping Attack | Yes | Yes | No | Yes |
Sensing Device Impersonate Attack | Yes | Yes | Yes | Yes |
Sybil Attacks | Yes | No | Yes | No |
Spoofing Attacks | Yes | Yes | No | Yes |
Denial of Service Attack (DoS) | Yes | Yes | Yes | No |
Spoofing Attacks | Yes | Yes | Yes | Yes |
Perfect forward and backward secrecy | Yes | Yes | No | Yes |
Base Station (BS) impersonate Attacks | Yes | Yes | Yes | Yes |