Skip to main content
. 2020 May 9;20(9):2707. doi: 10.3390/s20092707

Table 5.

Comparison of security properties.

SAKES EAKES6Lo S6AE
Header Verification × ×
Replay attack
Compromised attack ×
IP-Spoofing attack × ×
Unlinkability ×
Forward secrecy ×
Sybil attack
Impersonation attack
DOS attack
MITM attack
Identity Privacy Preservation × ×
Mutual authentication
Mobility ×