Table 5.
Comparison of security properties.
| SAKES | EAKES6Lo | S6AE | |
|---|---|---|---|
| Header Verification | × | × | ✓ |
| Replay attack | ✓ | ✓ | ✓ |
| Compromised attack | × | ✓ | ✓ |
| IP-Spoofing attack | × | × | ✓ |
| Unlinkability | × | ✓ | ✓ |
| Forward secrecy | × | ✓ | ✓ |
| Sybil attack | ✓ | ✓ | ✓ |
| Impersonation attack | ✓ | ✓ | ✓ |
| DOS attack | ✓ | ✓ | ✓ |
| MITM attack | ✓ | ✓ | ✓ |
| Identity Privacy Preservation | × | × | ✓ |
| Mutual authentication | ✓ | ✓ | ✓ |
| Mobility | × | ✓ | ✓ |