Skip to main content
. 2023 Jul 2;23(13):6104. doi: 10.3390/s23136104

Table 1.

Comparison of Security Analysis.

Research Schemes Plaintext Attack Eavesdropping Attack Tempering Attack Jamming Attack Collision Attack Sybil Attack Selective Forwarding Attack
[30] × × × ×
[31] × × × × ×
[32] × × × × × ×
[33] × × × × × ×
Proposed work